Regal is a linter for Rego, with the goal of making your Rego magnificent!
-
Updated
Jun 3, 2024 - Go
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Regal is a linter for Rego, with the goal of making your Rego magnificent!
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Write tests against structured configuration data using the Open Policy Agent Rego query language
An implementation of Envoy External Authorization
Audit Dependency-Track findings and policy violations via policy as code
A policy management tool for interacting with Gatekeeper
Traefik plugin which checks JWT tokens for required fields. Supports Open Policy Agent (OPA) and signature validation with JWKS
Create Kubernetes AdmissionReview requests from Kubernetes resource manifests
Golang REST API Template
Todo App
Integrations, examples, and proof-of-concepts that are not part of OPA proper.
An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.
HTTP/3-enable existing HTTP apps. Leverage HTTP3 native features and auto-enable workload identity (SPIFFE), AuthN (mTLS/x509, OIDC/Auth0-Okta), AuthZ (OPA), defense-in-depth (WAAP/WAF), and observability (metrics, logs, alerting, dashboard).
OPA Dependency Manager (ODM)
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
OPA GitHub Pull Request Review Bot.
CLI audit tool for GitHub organization with OPA/Rego
Merge and convert the rego coverage format to codecov json