-
When using the new `Certificate` option, the `validate_settings` should ensure the certificate can be verified using the optional `certificate_chain` provided by the user.
See https://github.com/ku…
-
Allow policy authors to verify OCI contents signed via sigstore using a user-provided certificate.
This is part of this epic: https://github.com/kubewarden/verify-image-signatures/issues/39
-
**Is your feature request related to a problem? Please describe.**
Kyverno policies are not listed in ArtifactHub.
**Describe the solution you'd like**
List Kyverno policies in ArtifactHub.
…
-
Knowing that the cert is signed by the certificates in the chain needs usage of the `picky` crate, not completely written in Rust, and therefore can't be compiled to Wasm and used directly in the pol…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Current Behavior
Following installation steps described in https://www.kubewarden.io/ produces error.
```ba…
-
Basically load `.wasm` files.
Capabilities:
- provide new commands,
- hook on events,
- call helix commands,
- access UI stuff…?
At first we could use a basic toml config file or CLI to feed…
-
## Description
Document the several models on using non-mutating and mutating policies altogether.
Currently, the defined order of execution of Kubewarden policies is just the order that the web…
-
It would be nice to offer equivalent of NV admission controller policies.
This is a list of the policies that NV currently offers that we can implement:
* [x] allow privilege escalation
* [x] k…
-
CLOmonitor complains that policy-server releases are not signed. We are signing our releases, but for some reason CLOmonitor is not detecting that.
See https://clomonitor.io/projects/cncf/kubewarde…
-
Research and describe a possible solution to automate the process of releasing Kubewarden components.