Brandt Keller
Brandt Keller
As we begin interacting with long-lived systems and consider event-based validation - It will be important to be able to identify which resources are failing validation. Consider traces for an...
under `website/content/en/docs` create an `opa-provider.md` file that documents the structure of how to add Lula OPA provider validations to an OSCAL file.
## Description Given that Lula is positioned to augment policy checks for more than simply security control compliance - it would be beneficial if a shared OSCAL file could be...
Printing in the rego may provide some additional debugging. https://github.com/open-policy-agent/opa/blob/main/rego/example_test.go#L1043
IF an existing Assessment Results file exists (determine how to identify this), then we should prepend the new result to the existing results array.
Reproduce the error: Run `lula validate ` while not valid context to kubernetes has been made. No report is generated and no message indicated a problem - simply exits.
Tracking issue for: - [ ] https://github.com/defenseunicorns/lula/security/code-scanning/6 Follow the above item for Implemention of a security file and changes required to the repository.
Generic file domain for processing a given target could open potential integrations with a variety of tools and reporting. Notably CVE scanning tools such as Grype & Trivy provide json...
After we have proven processes for performing the installation of Lula with `brew` - we should document the processes for installing and maintaining the installation of Lula with `brew`.
Placeholder for support of [Cedar](https://github.com/cedar-policy) as a provider in the Lula ecosystem. This thread can encompass both generation of interest (please leave a reaction or comment if interested) as well...