-
At this time, the `sources.yaml` file has to provide all expected keys:
- insecure_sources
- source_authorities
Remove this strictness and allow to omit one of the two. To keep the logic simple…
-
Epic: https://github.com/kubewarden/policy-evaluator/issues/56
These are the builtins that burrego has to provide that belong to the [Objects](https://www.openpolicyagent.org/docs/latest/policy-ref…
-
Although Artifactory is OCI compliant, https://www.jfrog.com/confluence/display/JFROG/Docker+Registry, following the official docs for distributing policies (https://docs.kubewarden.io/distributing-po…
-
Policy server allows to configure the following aspects of his log behaviour:
* Log level
* Log format
Both aspects can be configured either via cli flag or via dedicated environment variables.
…
-
So far we install lockc with `cargo xtask install` (our equivalent of `make install`) and run as a systemd unit. While that approach is fine for people who want to use lockc for local container engine…
-
To make Kubewarden more stable and robust we should write some test plan to cover expected behavior and important features. After that we should write the tests. So, this issue keep track of this tas…
jvanz updated
3 years ago
-
Rego policies can be built into WebAssembly modules that can then be evaluated. We have proved this to be possible using [this POC](https://github.com/flavio/burrego)
The goal of this issues is to …
-
We must provide a mutation webhook for the `ClusterAdmissionPolicy` resource.
The webhook will implement the following validations:
* `UPDATE` operation: do not allow to change the name of the pol…
-
Epic: https://github.com/kubewarden/policy-evaluator/issues/56
These are the builtins that burrego has to provide that belong to the [Debugging](https://www.openpolicyagent.org/docs/latest/policy-r…
-
Epic: https://github.com/kubewarden/policy-evaluator/issues/56
These are the builtins that burrego has to provide that belong to the [Glob](https://www.openpolicyagent.org/docs/latest/policy-refere…