Rego Style Guide
The purpose of this style guide is to provide a collection of recommendations and best practices for authoring Rego. From Styra, the founders of Open Policy Agent (OPA), and some of the most experienced members of the community, we hope to share lessons learnt from authoring and reviewing hundreds of thousands of lines of Rego over the years.
With new features, language constructs, and other improvements continuously finding their way into OPA, we aim to keep this style guide a reflection of what we consider current best practices. Make sure to check back every once in a while, and see the changelog for updates since your last visit.
Regal
Inspired by this style guide, Regal is a new linter for Rego that allows you to enforce many of the recommendations in this guide, as well as identifying issues, bugs and potential problems in your Rego policies. If you enjoy this style guide, make sure to check it out!
Contents
- General Advice
- Style
- Rules
- Variables and Data Types
- Functions
- Regex
- Packages
- Imports
- Older Advice
- Contributing
- Community
General Advice
Optimize for readability, not performance
Rego is a declarative language, which in the best case means you express what you want rather than how it should be retrieved. When authoring policy, do not try to be "smart" about assumed performance characteristics or optimizations. That's what OPA should worry about!
Optimize for readability and obviousness. Optimize for performance only if you've identified performance issues in your policy, and even if you do — making your policy more compact or "clever" almost never helps at addressing the problem at hand.
Related Resources
Use opa fmt
The opa fmt
tool ensures consistent formatting across teams and projects. While certainly not
perfect (yet!), unified formatting is a big win, and saves a
lot of time in code reviews arguing over details around style.
A good idea could be to run opa fmt --write
on save, which can be configured in most editors. If you want to enforce
opa fmt
formatting as part of your build pipeline, use opa fmt --fail
.
In order to not flood this guide with data, formatting conventions covered by opa fmt
will not be included here.
Tip: opa fmt
uses tabs for indentation. By default, GitHub uses 8 spaces to display tabs, which is arguably a bit
much. You can change this preference for your account in
github.com/settings/appearance,
or provide an .editorconfig file in your policy repository, which will be used by GitHub
(and other tools) to properly display your Rego files:
[*.rego]
end_of_line = lf
insert_final_newline = true
charset = utf-8
indent_style = tab
indent_size = 4
Sadly, there doesn't seem to be a way to enforce this for code blocks displayed in markdown (.md
) files.
You can lint for this recommendation using the opa-fmt
Regal rule. Get started with Regal, the Rego linter.
Use strict mode
Strict mode provides extra checks for common mistakes like
redundant imports, or unused variables. Include an opa check --strict path/to/polices
step as part of your build
pipeline.
Use metadata annotations
Favor metadata annotations over regular comments.
Metadata annotations allow external tools and editors to parse their contents, potentially leveraging them for something useful, like in-line explanations, generated docs, etc.
Annotations are also a good way to de-duplicate information such as documentation links, contact emails and error codes where explanations are returned as part of the result.
Avoid
# Example package with documentation
package example
import future.keywords.contains
import future.keywords.if
# E123: Deny non admin users.
# Only admin users are allowed to access these resources, see https://docs.example.com/policy/rule/E123
deny contains {
"code": 401,
"message": "Unauthorized due to policy rule (E123, https://docs.example.com/policy/rule/E123)",
} if {
input.admin == false
}
Prefer
# METADATA
# title: Example
# description: Example package with documentation
package example
import future.keywords.contains
import future.keywords.if
# METADATA
# title: Deny non admin users
# description: Only admin users are allowed to access these resources
# related_resources:
# - https://docs.example.com/policy/rule/E123
# custom:
# code: 401
# error_id: E123
deny contains {
"code": metadata.custom.code,
"message": sprintf("Unauthorized due to policy rule (%s, %s)", [
metadata.custom.error_id,
concat(",", [ref | ref := metadata.related_resources[_].ref]),
]),
} if {
input.admin == false
metadata := rego.metadata.rule()
}
Notes / Exceptions
Use regular comments inside of rule bodies, or for packages and rules you consider "internal".
Related Resources
Get to know the built-in functions
With more than 150 built-in functions tailor-made for policy evaluation, there's a good chance that some of them can help you accomplish your goal.
Consider using JSON schemas for type checking
As you author Rego policy, providing JSON schemas for your input
(and possibly data
) enables strict
type checking, letting you avoid simple — but common — mistakes,
like typos, or referencing nested attributes in the wrong location. This extra level of verification improves both the
developer experience as well as the quality of your policies.
Style
Prefer snake_case for rule names and variables
The built-in functions use snake_case
for naming — follow that convention for your own rules, functions, and variables.
Avoid
userIsAdmin if "admin" in input.user.roles
Prefer
user_is_admin if "admin" in input.user.roles
Notes / Exceptions
In many cases, you might not control the format of the input
data — if the domain of a policy (e.g. Envoy)
mandates a different style, making an exception might seem reasonable. Adapting policy format after input
is however
prone to inconsistencies, as you'll likely end up mixing different styles in the same policy (due to imports of common
code, etc).
You can lint for this recommendation using the prefer-snake-case
Regal rule. Get started with Regal, the Rego linter.
Optionally, use leading underscore for rules intended for internal use
While OPA doesn't have "private" rules or functions, a pretty common convention that we've seen in the community is to use a leading underscore for rules and functions that are intended to be internal to the package that they are in:
developers contains user if {
some user in input.users
_is_developer(user)
}
_is_developer(user) if {
# some conditions
}
_is_developer(user) if {
# some other conditions
}
While an is_developer
function may seem like a good candidate for reuse, it could easily be the case that this should
be considered to what this package considers a developer, and not necessarily a universal truth. Using a leading
underscore to denote this is a good way to communicate this intent, but there are also other ways to do this, like
agreed upon naming conventions, or using custom metadata annotation attributes.
One benefit of sticking to the leading underscore convention is that tools like Regal, and the language server for Rego that it provides, may use this information to provide better suggestions, like not adding references to these rules and functions from other packages.
Keep line length <=
120 characters
Long lines are tedious to read. Keep line length at 120 characters or below.
Avoid
frontend_admin_users := [username | some user in input.users; "frontend" in user.domains; "admin" in user.roles; username := user.username]
Prefer
frontend_admin_users := [username |
some user in input.users
"frontend" in user.domains
"admin" in user.roles
username := user.username
]
You can lint for this recommendation using the line-length
Regal rule. Get started with Regal, the Rego linter.
Rules
Use helper rules and functions
Helper rules makes policies more readable, and for repeated conditions more performant as well. If your rule contains more than a few simple expressions, consider splitting it into multiple rules with good names.
Avoid
allow if {
"developer" in input.user.roles
input.request.method in {"GET", "HEAD"}
startswith(input.request.path, "/docs")
}
allow if {
"developer" in input.user.roles
input.request.method in {"GET", "HEAD"}
startswith(input.request.path, "/api")
}
Prefer
allow if {
is_developer
read_request
startswith(input.request.path, "/docs")
}
allow if {
is_developer
read_request
startswith(input.request.path, "/api")
}
read_request if input.request.method in {"GET", "HEAD"}
is_developer if "developer" in input.user.roles
Additionally, helper rules and functions may be kept in (and imported from) separate modules, allowing you to build a logical — and reusable! — structure for your policy files.
Use negation to handle undefined
When encountering undefined references inside of rules, evaluation of the rule halts and the rule itself evaluates to
undefined, unless of course, a default
value has been provided. While saying allow is undefined
or allow is false
if encountering undefined in a rule is likely desirable, this doesn't hold true when working with "inverted" rules -
i.e. rules like deny
(as opposed to allow
). Saying deny is undefined
or deny is false
if undefined is
encountered, essentially means that any occurrence of undefined (such as when attributes are missing in the input
document) would lead to the deny
rule not getting enforced. This is particularly common writing partial rules (i.e.
rules that build sets or
objects).
Consider for example this simple rule:
Avoid
authorized := count(deny) == 0
deny contains "User is anonymous" if input.user_id == "anonymous"
At first glance, it might seem obvious that evaluating the rule should add a violation to the set of messages if the
user_id
provided in input
is equal to "anonymous". But what happens if there is no user_id
provided at all?
Evaluation will stop when encountering undefined, and the comparison will never be invoked, leading to nothing
being added to the deny
set — the rule allows someone without a user_id
. We could of course add another
rule, checking only for its presence:
deny contains "User ID missing from input" if not input.user_id
This is nice in that we'll get an even more granular message returned to the caller, but quickly becomes tedious when working with a large set of input data. To deal with this, a helper rule using negation may be used.
Prefer
authorized := count(deny) == 0
deny contains "User is anonymous" if not authenticated_user
authenticated_user if input.user_id != "anonymous"
In the above case, the authenticated_user
rule will fail both in the the undefined case, and if defined
but equal to "anonymous". Since we negate the result of the helper rule in the deny
rule, we'll have both
cases covered.
Related Resources
Consider partial helper rules over comprehensions in rule bodies
While comprehensions inside of rule bodies allows for compact rules, these are often harder to debug, and can't easily be reused by other rules. Partial rules may be referenced by any other rule, and more importantly, by you! Having many smaller, composable rules, is often key to quickly identifying where things fail, as each rule may be queried individually.
Avoid
allow if {
input.request.method in {"GET", "HEAD"}
input.request.path[0] == "credit_reports"
input.user.name in {username |
# These should not count as MFA
insecure_methods := {"email"}
some user in data.users
mfa_methods := {method | some method in user.authentication.methods} - insecure_methods
count(mfa_methods) > 1
username := user.name
}
}
Prefer
allow if {
input.request.method in {"GET", "HEAD"}
input.request.path[0] == "credit_reports"
input.user.name in mfa_authenticated_users
}
mfa_authenticated_users contains username if {
# These should not count as MFA
insecure_methods := {"email"}
some user in data.users
mfa_methods := {method | some method in user.authentication.methods} - insecure_methods
count(mfa_methods) > 1
username := user.name
}
Notes / Exceptions
Does not apply if ordering is of importance, or duplicate values should be allowed. For those cases, use array comprehensions.
Avoid prefixing rules and functions with get_
or list_
Since Rego evaluation is generally free of side effects, any rule or function is essentially a "getter". Adding a
get_
prefix to a rule or function (like get_resources
) thus adds little of value compared to just naming it
resources
. Additionally, the type and return value of the rule should serve to tell whether a rule might return a
single value (i.e. a complete rule) or a collection (a partial rule).
Avoid
get_first_name(user) := split(user.name, " ")[0]
# Partial rule, so a set of users is to be expected
list_developers contains user if {
some user in data.application.users
user.type == "developer"
}
Prefer
# "get" is implied
first_name(user) := split(user.name, " ")[0]
# Partial rule, so a set of users is to be expected
developers contains user if {
some user in data.application.users
user.type == "developer"
}
Notes / Exceptions
Using is_
, or has_
for boolean helper functions, like is_admin(user)
may be easier to comprehend than
admin(user)
.
You can lint for this recommendation using the avoid-get-and-list-prefix
Regal rule. Get started with Regal, the Rego linter.
Prefer unconditional assignment in rule head over rule body
Rules that return values unconditionally should place the assignment directly in the rule head, as doing so in the rule body adds unnecessary noise.
Avoid
full_name := name {
name := concat(", ", [input.first_name, input.last_name])
}
divide_by_ten(x) := y {
y := x / 10
}
Prefer
full_name := concat(", ", [input.first_name, input.last_name])
divide_by_ten(x) := x / 10
You can lint for this recommendation using the unconditional-assignment
Regal rule. Get started with Regal, the Rego linter.
Variables and Data Types
Use in
to check for membership
Using in
for membership checks clearly communicates intent, and is less prone to errors. This is especially true when
checking if something is not part of a collection.
Avoid
# "Old" way of checking for membership - iteration + comparison
allow {
"admin" == input.user.roles[_]
}
Prefer
allow if "admin" in input.user.roles
Avoid
deny contains "Only admin allowed" if not user_is_admin
user_is_admin if {
"admin" == input.user.roles[_]
}
Prefer
deny contains "Only admin allowed" if not "admin" in input.user.roles
You can lint for this recommendation using the use-in-operator
Regal rule. Get started with Regal, the Rego linter.
Prefer some .. in
for iteration
Using the some
.. in
construct for iteration removes ambiguity around iteration vs. membership checks, and is
generally more pleasant to read.
Avoid
my_rule if {
# Are we iterating users over a partial "other_rule" here,
# or checking if the set contains a user defined elsewhere?
other_rule[user]
}
While this could be alleviated by declaring some user
before the iteration, we can't take that consideration for
granted when reading code from someone else.
Avoid
# Iterating over array
internal_hosts contains hostname if {
host := data.network.hosts[_]
host.internal == true
hostname := host.name
}
# Iterating over object
public_endpoints contains endpoint if {
some endpoint
attributes := endpoints[endpoint]
attributes.public
}
Prefer
internal_hosts contains hostname if {
some host in data.network.hosts
host.internal == true
hostname := host.name
}
# Iterating over object
public_endpoints contains endpoint if {
some endpoint, attributes in endpoints
attributes.public
}
Notes / Exceptions
Using the "old" style of iteration may still be preferable when iterating over deeply nested structures.
# Building a list of all hostnames from a deeply nested structure
all_hostnames := [hostname | hostname := data.regions[_].networks[_].servers[_].hostname]
# ⬆️ is likely preferable over ⬇️
all_hostnames := [hostname |
some region in data.regions
some network in region
some server in network
hostname := server.hostname
]
You can lint for this recommendation using the prefer-some-in-iteration
Regal rule. Get started with Regal, the Rego linter.
Use every
to express FOR ALL
The every
keyword makes it trivial to describe "for all" type expressions, which previously required the use of
helper rules, or comparing counts of items in the original collection against a filtered one produced by a
comprehension.
Avoid
# Negate result of _any_ match
allow if not any_old_registry
any_old_registry if {
some container in input.request.object.spec.containers
startswith(container.image, "old.docker.registry/")
}
Prefer
allow if {
every container in input.request.object.spec.containers {
not startswith(container.image, "old.docker.registry/")
}
}
Avoid
words := ["always", "arbitrary", "air", "brand", "asphalt"]
all_starts_with_a if {
starts_with_a := [word |
some word in words
startswith(word, "a")
]
count(starts_with_a) == count(words)
}
Prefer
words := ["always", "arbitrary", "air", "brand", "asphalt"]
all_starts_with_a if {
every word in words {
startswith(word, "a")
}
}
Notes / Exceptions
Older versions of OPA used the all
built-in function to check that all elements of an array had the value true
.
This function has been deprecated for a long time, and will eventually be removed.
Don't use unification operator for assignment or comparison
The unification operator (=
) allows you
to combine assignment and comparison. While this is useful in a few specific cases (see "Notes / Exceptions" below),
using the assignment operator (:=
) for assignment, and the comparison operator (==
) for comparison, is almost always
preferable. Separating assignment from comparison clearly demonstrates intent, and removes the ambiguity around scope
associated with unification.
Avoid
# Top level assignment using unification operator
roles = input.user.roles
allow if {
# Unification operator - used for assignment to `username` variable or for
# comparing to a `username` variable or rule defined elsewhere? Who knows.
username = input.user.name
# ...
}
allow if {
# Unification operator used for comparison
input.request.method = "GET"
}
allow if {
some user
input.request.path = ["users", user]
input.request.user == user
}
Prefer
# Top level assignment using assignment operator
roles := input.user.roles
allow if {
# Assignment operator used for assignment - no ambiguity around
# intent, or variable scope
username := input.user.name
# ... do something with username
}
allow if {
# Comparison operator used for comparison
input.request.method == "GET"
}
allow if {
input.request.path == ["users", input.request.user]
}
Notes / Exceptions
Unification was used extensively in older versions of OPA, and following that, in the policy examples provided in the OPA documentation, blogs, and elsewhere. With the assignment and comparison operators now available for use in any context, there are generally few reasons to use the unification operator in modern Rego.
One notable exception is when matching for example, the path of a request (as presented in array form), where you'll want to do both comparison and assignment to variables from the path components:
# Using unification - compact but clear
router {
some user_id, podcast_id
["users", user_id, "podcasts", podcast_id] = input.request.path
# .. do something with user_id, podcast_id
}
# Using comparison + assignment - arguably messier
router {
input.request_path[0] == "users"
input.request_path[2] == "podcasts"
user_id := input.request_path[1]
podcast_id := input.request_path[3]
# .. do something with user_id, podcast_id
}
Related Resources
You can lint for this recommendation using the use-assignment-operator
Regal rule. Get started with Regal, the Rego linter.
Don't use undeclared variables
Using undeclared variables (i.e. not declared using some
or :=
) makes it harder to understand what's going on
in a rule, and introduces ambiguities around scope.
Avoid
messages contains message if {
message := input.topics[topic].body
}
Prefer
messages contains message if {
some topic
message := input.topics[topic].body
}
# Alternatively
messages contains message if {
some topic in input.topics
message := topic.body
}
# or
messages contains message if {
message := input.topics[_].body
}
You can lint for this recommendation using the use-some-for-output-vars
Regal rule. Get started with Regal, the Rego linter.
Prefer sets over arrays (where applicable)
For any unordered sequence of unique values, prefer to use sets over arrays.
This is almost always the case for common policy data like roles and permissions. For any applicable sequence of values, sets have the following benefits over arrays:
- Clearly communicate uniqueness and non-ordered characteristics
- Performance: set lookups are O(1) while array lookups are O(n)
- Powerful set operations available
Avoid
required_roles := ["accountant", "reports-writer"]
provided_roles := [role | some role in input.user.roles]
allow if {
every required_role in required_roles {
required_role in provided_roles
}
}
Prefer
required_roles := {"accountant", "reports-writer"}
provided_roles := {role | some role in input.user.roles}
allow if {
every required_role in required_roles {
required_role in provided_roles
}
}
Prefer
# Alternatively, use set intersection
allow if {
required_roles & provided_roles == required_roles
}
Related Resources
Functions
Prefer using arguments over input
, data
or rule references
What separates functions from rules is that they accept arguments. While a function too may reference anything from
input
, data
or other rules declared in a policy, these references create dependencies that aren't obvious simply by
checking the function signature, and it makes it harder to reuse that function in other contexts. Additionally,
functions that only depend on their arguments are easier to test standalone.
Avoid
# Depends on both `input` and `data`
is_preferred_login_method(method) if {
preferred_login_methods := {login_method |
some login_method in data.authentication.all_login_methods
login_method in input.user.login_methods
}
method in preferred_login_methods
}
Prefer
# Depends only on function arguments
is_preferred_login_method(method, user, all_login_methods) if {
preferred_login_methods := {login_method |
some login_method in all_login_methods
login_method in user.login_methods
}
method in preferred_login_methods
}
Avoid using the last argument for the return value
Older Rego policies sometimes contain an unusual way to declare where the return value of a function call should be
stored — the last argument of the function. True to it's
Datalog roots, return values may be stored
either using assignment (i.e. :=
) or by appending a variable name to the argument list of a function. These two
expressions are thus equivalent:
Avoid
first_a := i if {
indexof("answer", "a", i)
}
Prefer
first_a := i if {
i := indexof("answer", "a")
}
While the first form is valid, it is almost guaranteed to confuse developers coming from the most common programming languages. Again, optimize for readability!
You can lint for this recommendation using the function-arg-return
Regal rule. Get started with Regal, the Rego linter.
Regex
Use raw strings for regex patterns
Raw strings are interpreted literally, allowing
you to avoid having to escape special characters like \
in your regex patterns.
Avoid
all_digits if {
regex.match("[\\d]+", "12345")
}
Prefer
all_digits if {
regex.match(`[\d]+`, "12345")
}
You can lint for this recommendation using the non-raw-regex-pattern
Regal rule. Get started with Regal, the Rego linter.
Packages
Package name should match file location
When naming packages, the package name should reflect the file location. This makes the package implementation easier to find when looking up from elsewhere in a project as well.
When choosing to follow this recommendation, there are two options:
- Matching the directory and filename
- Pros: Reduced nesting for simple policies.
- Cons: Large packages can become unwieldy in long files.
- Matching the directory only
- Pros: Large packages can be broken into many files.
- Cons: Exception needed to co-locate test files (i.e.
package foo_test
should still be infoo/
).
Either is acceptable, just remember to use the same convention throughout your project.
Matching the directory and filename
Avoid
# foo/bar.rego
package bar.foo
# ...
Prefer
# foo/bar.rego
package foo.bar
# ...
Matching the directory only
Avoid
# foo/bar.rego
package baz
# ...
Prefer
# foo/bar.rego
package foo
# ...
Imports
Prefer importing packages over rules and functions
Importing packages rather than specific rules and functions allows you to reference them by the package name, making it obvious where the rule or function was declared. Additionally, well-named packages help provide context to assertions.
Avoid
import data.user.is_admin
allow if is_admin
Prefer
import data.user
allow if user.is_admin
You can lint for this recommendation using the prefer-package-imports
Regal rule. Get started with Regal, the Rego linter.
Avoid importing input
While importing attributes from the global input
variable might eliminate some levels of nesting, it makes the origin
of the attribute(s) less apparent. Clearly differentiating input
and data
from values, functions, and rules
defined inside of the same package helps in making things obvious, and few things beat obviousness!
Avoid
import input.request.context.user
# ... many lines of code later
fin_dept if {
# where does "user" come from?
contains(user.department, "finance")
}
Prefer
fin_dept if {
contains(input.request.context.user.department, "finance")
}
Prefer
fin_dept if {
# Alternatively, assign an intermediate variable close to where it's referenced
user := input.request.context.user
contains(user.department, "finance")
}
Notes / Exceptions
In some contexts, the source of data is obvious even when imported and/or renamed. A common practice is
to rename input
in Terraform policies for example, either via import
or a new top-level variable.
import input as tfplan
violations contains message if {
# still obvious where "tfplan" comes from, perhaps even more so — this is generally acceptable
some change in tfplan.resource_changes
# ...
}
You can lint for this recommendation using the avoid-importing-input
Regal rule. Get started with Regal, the Rego linter.
Older Advice
Advice placed here was valid at the time, but has since been replaced by new recommendations. Kept here for the sake of completeness, and to provide context for older policies.
Use explicit imports for future keywords
With the introduction of the import rego.v1
construct in OPA v0.59.0, this is no longer needed
In order to evolve the Rego language without breaking existing policies, many new features require importing
"future" keywords, like contains
,
every
, if
and in
. While it might seem convenient to use the "catch-all" form of import future.keywords
to
import all of the future keywords, this construct risks breaking your policies when new keywords are introduced, and
their names happen to collide with names you've used for variables or rules.
Avoid
import future.keywords
severe_violations contains violation if {
some violation in input.violations
violation.severity > 5
}
Prefer
import future.keywords.contains
import future.keywords.if
import future.keywords.in
severe_violations contains violation if {
some violation in input.violations
violation.severity > 5
}
Tip: Importing the every
keyword implicitly imports in
as well, as it is required by the every
construct.
Leaving out the import of in
when every
is imported is considered okay.
You can lint for this recommendation using the implicit-future-keywords
Regal rule. Get started with Regal, the Rego linter.
Contributing
This document is meant to reflect the style preferences and best practices as compiled by the OPA community. As such, we welcome contributions from any of its members. Since most of the topics in a guide like this are likely subject to discussion, please open an issue, and allow some time for people to comment, before opening a PR.
If you'd like to add or remove items for your own company, team or project, forking this repo is highly encouraged!
Community
For questions, discussions and announcements related to Styra products, services and open source projects, please join the Styra community on Slack!