A Buildkite plugin for executing Open Policy Agent against Terraform plans in a pipeline.
-
Updated
Sep 14, 2020 - Shell
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
A Buildkite plugin for executing Open Policy Agent against Terraform plans in a pipeline.
OPA rules for the Please build system
gator plugin for asdf version manager https://github.com/asdf-vm/asdf
GitOps template with K3d, ArgoCD, ELK stack and Open Policy Agent
OPA Test Runner: Apply policies to arbitrary json or yaml data using OPA and Rego.
Annotated OPA sidecar configuration
Enterprise OPA is a distribution of Open Policy Agent with enterprise-grade features to get OPA into production quickly, easily, and inexpensively.
Demo scripts for 'Enforcing Automatic mTLS with Linkerd and OPA Gatekeeper'
Run opa test command with GitHub Actions
Run conftest test command with GitHub Actions
Ultra fast and slim kubernetes playground.
[Archived] Blog post about OPA, Conftest, Gatekeeper and Konstraint
koans for OPA
Kubernetes Fury Distribution OPA Core Module: Policy enforcement for your Kubernetes Cluster
Open-source Platform for learning kubernetes and aws eks and preparation for for Certified Kubernetes exams (CKA ,CKS , CKAD)