Change the repository type filter
All
Repositories list
106 repositories
- A test policy that simulates long running policy evaluations
- A test context-aware policy written using Go Wasi
- Go-to CLI tool for Kubewarden users
- Reports evaluation of existing Kubernetes resources with your already deployed Kubewarden policies.
priority-class-policy
PublicValidates Pod's priority class- Policy is designed to enforce constraints on the resource requirements of Kubernetes containers
policy-sdk-js
PublicExperimental Kubewarden SDK for TypeScript and JavaScript- A demo policy showing how to access Kubernetes resources at policy evaluation time
- Template of a plain WASI policy written using Go
- Demo policy showing how to write a raw OPA validating policy
- A Kubewarden Policy that controls the usage of environment variables
load-testing
PublicHTTP load to stress policy-server- Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
- A collection of Rego policies that can be used to enforce best practices in Kubernetes clusters
- A Kubewarden Policy that controls the usage of `volumeMounts`
- A policy that detects webhook services used by admission controller that are accidentally exposed outside of the cluster
- Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths
volumes-psp-policy
PublicReplacement for the Kubernetes Pod Security Policy that controls the usage of volumessafe-labels-policy
PublicKubewarden policy that validates Kubernetes' resource labels- Policy validates that there are no services with the same set of selectors
- Validates annotations
trusted-repos-policy
PublicA Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to- Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
- Kubewarden policy designed to automatically propagate labels defined in a Kubernetes namespace to the associated resources within that namespace
- A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
- A policy that prevents the creation of Service resources with type LoadBalancer
- A policy that prevents the creation of Service resources with type NodePort
- Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context