A Chimera Policy written in Rust that ensures only trusted users can create workloads tolerating a chosen taint
-
Updated
Feb 8, 2021 - Rust
A Chimera Policy written in Rust that ensures only trusted users can create workloads tolerating a chosen taint
A Kubewarden policy to check liveness and readiness probes
A Kubewarden policy to disallow usage of the default namespace
A Kubewarden rust policy template to be used with cargo-generate
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
Kubewarden Policy SDK for the Rust programming language
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules. Take this survey to provide feedback about cfn-guard: https://amazonmr.au1.qualtrics.com/jfe/form/SV_bpyzpfoYGGuuUl0
Cedar-agent is the easiest way to deploy and run Cedar
Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers
A demo policy showing how to access Kubernetes resources at policy evaluation time
Demo policy showing how to write a raw validating policy
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
A Pod Security Policy that controls Container Capabilities
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
Policy validates that there are no services with the same set of selectors
A Kubernetes dynamic admission controller that uses WebAssembly policies to validate incoming requests
A test policy that simulates long running policy evaluations
Crate used by Kubewarden that is able to pull policies from OCI registries and HTTP servers.
Add a description, image, and links to the policy-as-code topic page so that developers can more easily learn about it.
To associate your repository with the policy-as-code topic, visit your repo's landing page and select "manage topics."