-
In Artifact Hub, the `official` status means that the publisher **owns the software** a package primarily focuses on. If we consider the *example* of a [chart used to install Consul](https://artifacth…
-
With the audit feature, we added support for new Policy Resource annotations (not to confuse with Policy metadata.yaml annotations), for policy severity and policy category. These are:
```yaml
metad…
-
Perform a RC1 of the Kubewarden 1.7.0 stack:
- [x] kwctl
- [x] policy-server
- [x] kubewarden-controller
- [ ] helm chart
-
As an spin off of the issue #10, this issue aims to keep track of the changes required to publish the policy on artifacthub.io. To make that possible we need to do the following:
- [ ] @nlamirault …
-
In Artifact Hub, the `official` status means that the publisher **owns the software** a package primarily focuses on. If we consider the *example* of a [chart used to install Consul](https://artifacth…
-
### To reproduce
Create new policy (context-aware settings are broken in current UI, use them to break policy)
-> new ClusterAdmissionPolicy
-> Namespace label propagator (Protect mode)
-> fill na…
-
The default value is spec.backgroundAudit is true, hence, we can to set it to false for the policies targeting *. Right now we don't have policies using user/group information. Add the severity and ca…
-
In order to validate images used for upgrades in kubernetes, we can have a kubewarden policy to validate cosign images and prevent upgrades from being pulled and hitting nodes.
Ping Kubewarden team t…
-
When a user deploy a context aware policy without the relevant context aware configuration, the policy starts to run but it fails on evaluation time. Which can broke resources deployment in the whole …
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Current Behavior
When trying to run `make policy.wasm`, the compiler just throws a bunch of errors.
### Expec…