{"payload":{"pageCount":4,"repositories":[{"type":"Public","name":"sysctl-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden policy that controls usage of sysctls","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":2,"starsCount":2,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:19:57.741Z"}},{"type":"Public","name":"capabilities-psp-policy","owner":"kubewarden","isFork":false,"description":"A Pod Security Policy that controls Container Capabilities","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":2,"starsCount":5,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:19:51.810Z"}},{"type":"Public","name":"context-aware-demo","owner":"kubewarden","isFork":false,"description":"A demo policy showing how to access Kubernetes resources at policy evaluation time","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:15:35.553Z"}},{"type":"Public","name":"persistentvolumeclaim-storageclass-policy","owner":"kubewarden","isFork":false,"description":"Policy that validates and adjusts the usage of StorageClasses in PersistentVolumeClaims","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:14:15.557Z"}},{"type":"Public","name":"kwctl","owner":"kubewarden","isFork":false,"description":"Go-to CLI tool for Kubewarden users","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":2,"issueCount":15,"starsCount":70,"forksCount":15,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:14:10.454Z"}},{"type":"Public","name":"echo","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that echoes Kubernetes' AdmissionReview objects","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:12:46.208Z"}},{"type":"Public","name":"deprecated-api-versions-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":15,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:03:23.668Z"}},{"type":"Public","name":"rancher-project-propagate-labels","owner":"kubewarden","isFork":false,"description":"Propagate Rancher Project labels to the Namespaces it owns","allTopics":[],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":3,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T02:01:29.448Z"}},{"type":"Public","name":"ingress-policy","owner":"kubewarden","isFork":false,"description":"Policy to enforce requirements on Kubernetes Ingress resources.","allTopics":["kubernetes","ingress","webassembly","hacktoberfest","policy-as-code","kubernetes-security","ingresses-resources","kubewarden-policy"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":1,"starsCount":4,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:59:59.076Z"}},{"type":"Public","name":"verify-image-signatures","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":2,"starsCount":12,"forksCount":9,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:58:35.238Z"}},{"type":"Public","name":"unique-service-selector-policy","owner":"kubewarden","isFork":false,"description":"Policy validates that there are no services with the same set of selectors","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:49:25.443Z"}},{"type":"Public","name":"cel-policy","owner":"kubewarden","isFork":false,"description":"A policy that can run CEL expressions","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":9,"starsCount":0,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:49:02.562Z"}},{"type":"Public","name":"sleeping-policy","owner":"kubewarden","isFork":false,"description":"A test policy that simulates long running policy evaluations","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":0,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:47:57.413Z"}},{"type":"Public","name":"trusted-repos-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes-compliance","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":5,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:42:36.433Z"}},{"type":"Public","name":"psa-label-enforcer-policy","owner":"kubewarden","isFork":false,"description":"Kubewarden policy that ensures that namespaces have the required PSA labels","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:39:22.985Z"}},{"type":"Public","name":"context-aware-test-policy","owner":"kubewarden","isFork":false,"description":"A test context-aware policy","allTopics":[],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:37:47.838Z"}},{"type":"Public","name":"host-namespaces-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":1,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:31:11.363Z"}},{"type":"Public","name":"safe-annotations-policy","owner":"kubewarden","isFork":false,"description":"Kubewarden policy that validates Kubernetes' resource annotations","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes-compliance","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":2,"starsCount":4,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:29:36.741Z"}},{"type":"Public","name":"apparmor-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Pod Security Policy that controls usage of AppArmor profiles","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":6,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:22:17.403Z"}},{"type":"Public","name":"user-group-psp-policy","owner":"kubewarden","isFork":false,"description":"This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":7,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:16:24.126Z"}},{"type":"Public template","name":"go-policy-template","owner":"kubewarden","isFork":false,"description":"A template repository to quickly scaffold a Kubewarden policy written with Go language","allTopics":["go","kubernetes","golang","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy-template"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":1,"starsCount":9,"forksCount":15,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:12:32.971Z"}},{"type":"Public","name":"raw-validation-policy","owner":"kubewarden","isFork":false,"description":"Demo policy showing how to write a raw validating policy","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:09:02.758Z"}},{"type":"Public","name":"hostpaths-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":2,"starsCount":2,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:06:30.103Z"}},{"type":"Public","name":"environment-variable-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Policy that controls the usage of environment variables","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":2,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:05:55.342Z"}},{"type":"Public","name":"flexvolume-drivers-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":1,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:04:54.705Z"}},{"type":"Public","name":"allowed-proc-mount-types-psp-policy","owner":"kubewarden","isFork":false,"description":"Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":7,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T01:03:07.331Z"}},{"type":"Public","name":"allow-privilege-escalation-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation","allTopics":["webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":2,"starsCount":5,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T00:55:05.203Z"}},{"type":"Public","name":"share-pid-namespace-policy","owner":"kubewarden","isFork":false,"description":"Policy validates pods sharing processes PID namespace","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":1,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T00:53:52.152Z"}},{"type":"Public","name":"readonly-root-filesystem-psp-policy","owner":"kubewarden","isFork":false,"description":"A Kubewarden policy that enforces root filesystem to be readonly","allTopics":["kubernetes","webassembly","hacktoberfest","policy-as-code","pod-security-policy","kubernetes-security","kubewarden-policy"],"primaryLanguage":{"name":"Rust","color":"#dea584"},"pullRequestCount":1,"issueCount":3,"starsCount":2,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T00:49:38.636Z"}},{"type":"Public","name":"safe-labels-policy","owner":"kubewarden","isFork":false,"description":"Kubewarden policy that validates Kubernetes' resource labels","allTopics":["webassembly","hacktoberfest","policy-as-code","kubernetes-security","kubernetes-compliance","kubewarden-policy","kubernetes"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":1,"starsCount":5,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-24T00:48:37.852Z"}}],"repositoryCount":93,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}