Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent
-
Updated
Jan 17, 2019 - Go
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Kubernetes Operator to manage Dynamic Admission Controllers using Open Policy Agent
Audit Logging for OPA Decision Logs
A e2e demo of serverless technologies
An easy way to generate Gatekeeper contraintTemplates from Rego files.
OPA-Envoy-SPIRE External Authorization Example.
Synchronize profile editors into the Open Policy Agent for use in MinIO Access Control / Synchronisation de données des éditeurs de profiles stockés dans Open Policy Agent, ceux-ci utilisés pour la contrôle d'accès à MinIO
Check K8s yaml-files and helm-charts with rego policies
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
Experimental AWS ApiGateway Authorizer Go Lambda with embedded Open Policy Agent
This example app acts as a webhook server that listens to Terraform Cloud Run Tasks and performs OPA evaluation using open-policy-agent Go API.
open policy agent gin middleware for custom usage
Helm Chart Unit: helps to unit test rendering of your templates using policies
Examples for validation using Policy Language Rego
Watch your in cluster Kubernetes manifests for OPA policy violations and export them as Prometheus metrics
Sign your artifacts, source code or container images using Sigstore tools, Save the Signatures you want to use, and Validate & Control the deployments to allow only the known Sources based on Signatures, Maintainers & other payloads automatically.
Open Policy Agent (OPA) Authorization middleware for Traefik
Merge and convert the rego coverage format to codecov json
CLI audit tool for GitHub organization with OPA/Rego
OPA GitHub Pull Request Review Bot.
HTTP/3-enable existing HTTP apps. Leverage HTTP3 native features and auto-enable workload identity (SPIFFE), AuthN (mTLS/x509, OIDC/Auth0-Okta), AuthZ (OPA), defense-in-depth (WAAP/WAF), and observability (metrics, logs, alerting, dashboard).