November Newsletter

Peter O'Neill
Open Policy Agent
Published in
4 min readJan 25, 2023

--

*|MC:SUBJECT|* *|MC_PREVIEW_TEXT|*

View this email in your browser

Logo

The OPA Monthly Newsletter

November Edition!

November has arrived and we are looking forward to the holiday season!

Thanks to all of the community members that stopped by the booth at Kubecon, it was a pleasure meeting you!

User Survey

We are looking for input from the community to see how everyone is using OPA. Take 5 minutes to fill out this 7 question survey to help out the community!

Take the Survey

Ecosystem Updates

Open Policy Agent v0.46.1

  • New language feature: refs in rule heads
  • Entrypoint annotations in rule metadata
  • New Built-in Functon: graphql.schema_is_valid
  • New Built-in Functon: net.cidr_is_valid

Gatekeeper 3.10.0

  • Kubernetes v1.25+, removal of Pod Security Policies and migration to Pod Security Admission 🔐
  • Mutation is promoted to stable 🦠
  • Introducing Validation of Workload Resources as alpha 🚀
  • Performance improvements 🏃

Contributor Shout Outs

Thanks to all of the contributors that participated in these releases, the OPA community wouldn’t be here without you!

  • @mattfarina
  • @jaspervdj
  • @ricardomaraschini
  • @byronic
  • @philipaconrad
  • @pjbgf
  • @caldwecr
  • @hzliangbin
  • @peterchenadded
  • @phantlantis
  • @ericjkao
  • @TheLunaticScripter
  • @humbertoc-silva
  • @Juneezee
  • @vinhph0906
  • @aholmis
  • @Joffref
  • @olegroom
  • @iamatwork
  • @fredallen-wk
  • @bartandacc
  • @max0ne
  • @OpenSourceZombie
  • @JAORMX
  • @Boojapho
  • @ethanrange
  • @stp-bsh
  • @qa-ship-it
  • @salaxander
  • @boatmisser
  • @gracedo
  • @meons
  • @mariusblarsen

Community Tools

Open Policy Agent: Keywords, Contains and If

circle-policy-agent

The policy-agent is essentially a CircleCI-flavored wrapper library around the Open Policy Agent (OPA), which will allow the users to write the policy documents in CircleCI terminology.

Star on GitHub

custom-opa-spicedb

This experiment adds support for querying relations from Authzed / SpiceDB via GRPC to check resource level permissions as custom builtin commands for Open Policy Agent.

Star on GitHub

Videos 🎥

Policy as Code with Open Policy Agent — Anders Eknert, Styra

Should user Alice be allowed to read credit reports? Should a cloud instance be deployable without basic security configuration in place? Should service X be allowed to query the database? Policy defines the rules of our systems, but how do we ensure our policies are enforced consistently in increasingly distributed and diverse tech stacks? In this talk we’ll explore the benefits of decoupling policy from our applications, deployment pipelines and platforms, and how Open Policy Agent (OPA) can help unify the way we work with policy across the stack.

Policy as Code with Open Policy Agent - Anders Eknert, Styra

Securing kubernetes with opa and gatekeeper

Starts at 3:23:20 as part of the Kubehuddle Edinburgh event.

KubeHuddle - Day 1 - Lloyds Banking Group Track

Blogs

I have a plan! Exploring the OPA Intermediate Representation (IR) format

5 Application Authorization Best Practices for Better Cybersecurity

Intro to sets in Rego

OPA into WASM

Opa for k8s

Spring Security Authorization with OPA

Programming Your Policies: Justin Cormack at QCon San Francisco 2022

Let us know how we did

The OPA monthly newsletter is built for the OPA community, let us know what you liked or what you wanted to see more of. Reach out using one of the links below.

Email icon
Website icon
Twitter icon

*|IFNOT:ARCHIVE_PAGE|**|HTML:LIST_ADDRESS_HTML|**|END:IF|*

Update Preferences | Unsubscribe

--

--