Change the repository type filter
All
Repositories list
95 repositories
kwctl
PublicGo-to CLI tool for Kubewarden users- A policy that can run CEL expressions
fleet-example
PublicExample of Rancher Fleet bundle for Kubewardencommunity
PublicKubewarden's community repository- A Kubewarden Policy that limits the ability to create privileged containers
load-testing
PublicHTTP load to stress policy-server- A Kubewarden Policy that echoes Kubernetes' AdmissionReview objects
- Policy validates pods sharing processes PID namespace
- Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces
selinux-psp-policy
PublicReplacement for the Kubernetes Pod Security Policy that controls the usage of SELinux- Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
- Policy that validates and adjusts the usage of StorageClasses in PersistentVolumeClaims
context-aware-demo
PublicA demo policy showing how to access Kubernetes resources at policy evaluation timepod-runtime-class-policy
PublicA Kubewarden Policy that controls the usage of Pod runtimeClasssleeping-policy
PublicA test policy that simulates long running policy evaluationstrusted-repos-policy
PublicA Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer toraw-validation-policy
PublicDemo policy showing how to write a raw validating policyuser-group-psp-policy
PublicThis Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groupsapparmor-psp-policy
PublicA Kubewarden Pod Security Policy that controls usage of AppArmor profiles- A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
- A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
seccomp-psp-policy
PublicA Kubewarden Pod Security Policy that controls usage of Seccomp profilescapabilities-psp-policy
PublicA Pod Security Policy that controls Container Capabilities- A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
- Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
volumeMounts-policy
PublicA Kubewarden Policy that controls the usage of `volumeMounts`- Policy validates that there are no services with the same set of selectors
- A Kubewarden policy that enforces root filesystem to be readonly