Core
Open source compliance automation for SOC 2, GDPR, ISO27001, NIST 800-53, and more
Install / Use
/learn @theopenlane/CoreREADME

This repository houses the core server and orchestration elements which are at the heart of the Openlane cloud service. Sign up for an account today (no credit card required) and try it out!
Feature Overview
- Creation of new programs that include pre-built templates, controls, risks, etc., for standards like SOC2, ISO27001, NIST800-53, and more
- Automated Task assignments and configurable workflows with task reminders and escalation
- Evidence upload, approval processes, and other configurable automation to get you through your audits
- Robust user and group management with a myriad of RBAC controls / toggles to ensure individuals in your company see what they are supposed to see
- Multiple authentication methods and organization-level controls for authorized domains including organization-wide SSO
- Automated domain scanning with assets and other resources created automatically for your approval
- Questionnaire creation, customization, and automation for easier internal and external interactions with your staff, auditors, and vendors
- Notification customizations, channel definitions, comments and histories on all your objects
- Easy to use documentation editors and storage for Policies and Procedures, or whatever documentation is needed .... and more!
High-level Roadmap
- Trust Center and vanity domains - Now available!
- Automated Evidence collection
- Continuous GRC features
- Vulnerability Management
- Source code scanning
- Internal training programs and tracking mechanisms
For more information or to learn about how to use the system, visit our docs page
Development
[!TIP] This repo takes heavy use of
go:buildflags to help with compile times, which can result in tooling like VSCode showing errors of unknown functions. It is suggested to add the following build flags to your settings:
-tags=cli,test,codegen,examples
Layout
The repo contains three main modules:
- core - this is the root go module, containing all the main api for openlane.
- common - this contains packages that core depends on, along with external repos. This commonly holds type definitions that need to be exported and referenced by other applications
- cli - this contains the openlane-cli, this is dependent on the
go-clientwhich is currently in another repo, but the cli is frequently used within development so we've left this here for now
Dependencies
The vast majority of behaviors of the system can be turned on or off by updating
the configuration parameters found in config; in some instances, we've made
features or integrations with third party systems which are "always on", but
we're happy to receive PR's wrapping those dependencies if you are interested in
running the software without them!
Installing Dependencies
Setup Taskfile by following the
instructions and using one of the various convenient package managers or
installation scripts. After installation, you can then simply run task install
to load the associated dependencies. Nearly everything in this repository
assumes you already have a local golang environment setup so this is not
included. Please see the associated documentation.
Installing the CLI
You can install the Openlane CLI by running brew install --cask theopenlane/tap/openlane
Updating Configuration Settings
See the README in the config directory.
Starting the Server
-
Copy the config, this is in .gitignore so you do not have to worry about accidentally committing secrets. This will be done automatically if it doesn't already exist when starting the api server locally with the Taskfile.
cp ./config/config-dev.example.yaml ./config/.config.yaml -
Update the configuration with whatever respective settings you desire; the defaults inside should allow you to run the server without a problem
[!TIP] When developing locally, unless you are specifically testing subscriptions and module enforcement, ensure the following settings are set to false:
entConfig: modules: enabled: false subscription: enabled: false
-
Use the task commands to start the server
Run the core server in development mode with dependencies in docker
task run-devRun fully in docker
task docker:all:upRun fully in docker, with a published image:
task docker:core:published -
In a separate terminal, with the server running, you can create a verified test user by running:
task cli:user:all -
Once this command has finished ^, you can login and perform actions as user
mitb@theopenlane.iowith passwordmattisthebest1234
CSRF Tokens
The server enforces CSRF protection on all mutating requests. Clients must
include a valid token in the X-CSRF-Token header. Existing client code can
create a client with the CSRF Token using the following function. This function
will grab a valid CSRF token from the /livez endpoint and send it for subsequent requests.
client.ClientWithCSRFToken(ctx, opts...)
You can also manually call InitCSRF on the client:
ctx := context.Background()
if err := client.InitCSRF(ctx); err != nil {
// handle error
}
The CLI has been updated to call ClientWithCSRFToken automatically, but other custom clients will need to adopt one of the approaches.
[!NOTE] Because the CSRF middleware stores the token only in the client’s cookie and not on the server, restarting the core server (or core server running in Kubernetes pods) does not invalidate the token. When the middleware receives a request, it checks the token in the
csrf_tokencookie against theX-CSRF-Tokenheader. If the cookie is already present, that same token is used — no new token is generated. The token cookie persists until it expires (default 24h), so clients will continue to send the same value even if the server has restarted.Therefore, rolling restarts on Kubernetes will not force new tokens to be issued and should not cause requests to fail, provided the client retains its CSRF cookie.
Creating Queries in GraphQL
It's recommended to use the
apollo sandbox and ensure
the following origin is allowed in your config/.config.yaml
server:
cors:
allowOrigins:
- https://studio.apollographql.com
In the apollo settings you will need to configure your connection settings:
- Endpoint:
http://localhost:17608/query - Shared Headers:
AuthorizationBearer tolp_REDCATED
You can obtain a local personal access token or api token against your local api by running:
task cli:token:create
task cli:pat:create
These are also created automatically when you setup the test user using task cli:user:all
OpenFGA Playground
You can load up a local openFGA environment with the compose setup in this
repository; task fga:up - this will launch an interactive playground where you
can model permissions model(s) or changes to the models
Creating a new Schema
To ease the effort required to add additional schemas into the system a template + task function has been created. This isn't doing anything terribly complex, but it's attempting to ensure you have the minimum set of required things needed to create a schema - most notably: you need to ensure the IDMixin is present (otherwise you will get ID type conflicts) and a standard set of schema annotations.
NOTE: you still have to make intelligent decisions around things like the presence / integration of hooks, interceptors, policies, etc. This is saving you about 10 seconds of copy-paste, so don't over estimate the automation, here.
To generate a new schema, you can run task db:newschema -- [yourschemaname] where
you replace the name within []. Please be sure to note that this isn't a
command line flag so there's a space between -- and the name.
Migrations
We use atlas and
goose to create and manage our DB
migrations - you can trigger one via task atlas:create and that will generate
the necessary migrations. There should be two migration files created in
db/migrations and db/migrations-goose-postgres, one for the base schema and one for the history schema.
On every PR, the Atlas integration also creates comments with any issues related to the schema changes
/ migrations.
Deploying
The only "supported" method of deploying today is locally, but all required docker containers are available in the GitHub container registry for deployment in Kubernetes.
Contributing
See the contributing guide for more information.
UI
We have additionally open-sourced the Openlane UI and you can run / use this technology locally (or host it on your own servers) but we have not undergone efforts to ensure things such as links to our
Related Skills
healthcheck
337.7kHost security hardening and risk-tolerance configuration for OpenClaw deployments
xurl
337.7kA CLI tool for making authenticated requests to the X (Twitter) API. Use this skill when you need to post tweets, reply, quote, search, read posts, manage followers, send DMs, upload media, or interact with any X API v2 endpoint.
prose
337.7kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
Writing Hookify Rules
83.3kThis skill should be used when the user asks to "create a hookify rule", "write a hook rule", "configure hookify", "add a hookify rule", or needs guidance on hookify rule syntax and patterns.
