A demo showcasing some examples of Test-Driven Development (TDD) for Infrastructure
-
Updated
Apr 15, 2020 - Gherkin
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
A demo showcasing some examples of Test-Driven Development (TDD) for Infrastructure
A policy evaluation Java client for OPA.
A simple example showing how to restrict a custom HTTP API using the Open Policy Agent.
open policy agent gin middleware for custom usage
KPR validates multiple kubernetes manifests.
Use Open Policy Agent in combination with Azure Kubernetes cluster
Check K8s yaml-files and helm-charts with rego policies
A collection of various Rego utility functions
An example of local Open Policy Agent (OPA) testing pipeline for Java\Spring Boot\Maven projects
CLI audit tool for GitHub organization with OPA/Rego
A tool to visualize policies written in Rego and their evaluation process.
Microservices Authantication and Authorization
📦 Ready-to-use Docker container image with cloud tools (AWS CLI, Google Cloud CLI, Terraform, Packer, Ansible)
Silly little example how you could delegate policy decisions to ChatGPT.
The Styra-supported driver to connect to Open Policy Agent (OPA) and Enterprise OPA deployments
An example Authorization Manager using Open Policy Agent
Terraform Module to deploy customizable CloudFront auth-at-edge and url-rewriter middlewares via Lambda@Edge
Clojure client for Open Policy Agent
Lab tuning Rego evaluation time from 17 seconds to 1 second
Julia OpenPolicyAgent Client, Server and CLI.