Skip to content
#

opa

open-policy-agent logo

The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.

Community & Support

What is OPA

Here are 174 public repositories matching this topic...

srenatus
srenatus commented Jan 25, 2022

Since we've started shipping binaries for that platform (#4254), it would be good to also run tests on it.

Note: the same would be true for windows; but we've skipped running tests there because of too many hardcoded assumptions about file paths in our tests. For linux/arm64, however, that should not be a problem.

The work done on the github workflow in #4254 could serve as an example: we'd

gatekeeper
julianKatz
julianKatz commented Dec 8, 2021

The metrics reporting functions are found in a variety of locations as of the creation of this bug:

❯ find ./pkg -name "stats_reporter.go"
./pkg/controller/mutators/stats_reporter.go
./pkg/controller/constrainttemplate/stats_reporter.go
./pkg/controller/sync/stats_reporter.go
./pkg/controller/constraint/stats_reporter.go
./pkg/audit/stats_reporter.go
./pkg/mutation/stats_reporte
opal
cloudkey
cloudkey commented Dec 2, 2020

Is your feature request related to a problem? Please describe.
Ranger is a popular solution for big data permission verification, but it does not support AWS-S3 permission verification at present.

Describe the solution you'd like
At present, I have an idea that the Proxy intercepts the S3 request, sends the request to ranger-S3-Plugin for authorization verification, and then sends t