All Projects → aserto-dev → runtime

aserto-dev / runtime

Licence: Apache-2.0 license
an abstraction library on top of OPA

Programming Languages

go
31211 projects - #10 most used programming language
Open Policy Agent
39 projects

Labels

Projects that are alternatives of or similar to runtime

postee
Simple message routing system that receives input messages through a webhook interface and can enforce actions using predefined outputs via integrations.
Stars: ✭ 160 (+627.27%)
Mutual labels:  opa
opa-java-spring-client
Simple Spring client for working with the Open Policy Agent
Stars: ✭ 19 (-13.64%)
Mutual labels:  opa
container-image-sign-and-verify-with-cosign-and-opa
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
Stars: ✭ 54 (+145.45%)
Mutual labels:  opa
pre-commit-opa
Pre-commit git hooks for Open Policy Agent (OPA) and Rego development
Stars: ✭ 53 (+140.91%)
Mutual labels:  opa
CKS-Exercises-Certified-Kubernetes-Security-Specialist
A set of curated exercises to help you prepare for the CKS exam
Stars: ✭ 124 (+463.64%)
Mutual labels:  opa
k8s-opa-boilerplate
Boilerplate example of managing OPA with kustomize
Stars: ✭ 14 (-36.36%)
Mutual labels:  opa
opa-java-client
No description or website provided.
Stars: ✭ 25 (+13.64%)
Mutual labels:  opa
Gatekeeper
Gatekeeper - Policy Controller for Kubernetes
Stars: ✭ 2,194 (+9872.73%)
Mutual labels:  opa
s3-proxy
S3 Reverse Proxy with GET, PUT and DELETE methods and authentication (OpenID Connect and Basic Auth)
Stars: ✭ 106 (+381.82%)
Mutual labels:  opa
opal
Policy and data administration, distribution, and real-time updates on top of Open Policy Agent
Stars: ✭ 459 (+1986.36%)
Mutual labels:  opa
fury-kubernetes-opa
Kubernetes Fury OPA. Policy enforcement for your Kubernetes Cluster
Stars: ✭ 34 (+54.55%)
Mutual labels:  opa
prancer-compliance-test
This repository includes cloud security policies for IaC and live resources.
Stars: ✭ 32 (+45.45%)
Mutual labels:  opa
OPA-python-client
Python client for Open Policy Agent
Stars: ✭ 24 (+9.09%)
Mutual labels:  opa
opa-docker-authz
A policy-enabled authorization plugin for Docker.
Stars: ✭ 67 (+204.55%)
Mutual labels:  opa
awesome-opa
A curated list of OPA related tools, frameworks and articles
Stars: ✭ 316 (+1336.36%)
Mutual labels:  opa
ccheck
A command line tool for validating Kubernetes configs with rego
Stars: ✭ 63 (+186.36%)
Mutual labels:  opa
regolibrary
The rego library package contains the controls Kubescape uses for detecting miss-configurations in Kubernetes manifests
Stars: ✭ 45 (+104.55%)
Mutual labels:  opa
dotnet-opa-wasm
Call Open Policy Agent (OPA) policies in WASM (Web Assembly) from .NET Core
Stars: ✭ 36 (+63.64%)
Mutual labels:  opa
Opa
An open source, general-purpose policy engine.
Stars: ✭ 5,939 (+26895.45%)
Mutual labels:  opa
opa-spring-security
Open Policy Agent for Spring Security
Stars: ✭ 19 (-13.64%)
Mutual labels:  opa

runtime - an abstraction library on top of the Open Policy Agent (OPA)

Go Reference Go Report Card

Introduction

The "runtime" project is a library that sits on top of OPA.

The goal of the project is to allow you to quickly write code that builds, runs or tests OPA policies.

It uses the options pattern to facilitate construction of Runtime instances specific to your needs. You can start super simple, using it just to build some rego into a bundle, or you can get more complex, using it to start a runtime with plugins, built-ins and other features.

Install

go get -u github.com/aserto-dev/runtime

Usage

// Create a runtime
r, cleanup, err := runtime.NewRuntime(ctx, &logger, &runtime.Config{})
if err != nil {
  return errors.Wrap(err, "failed to create runtime")
}
defer cleanup()

// Use the runtime to build a bundle from the current directory
return r.Build(runtime.BuildParams{
  OutputFile: "my-bundle.tar.gz",
}, ".")

You can find a more complete example in the example directory.

Credits

Based on the awesome Open Policy Agent.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].