Skip to content

Commit b0fce49

Browse files
committed
PLAT-1431 Added artifacthub initial config
1 parent 3028e6c commit b0fce49

File tree

6 files changed

+15
-5
lines changed

6 files changed

+15
-5
lines changed

artifacthub-repo.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
---
2+
repositoryID: 9e1c3fdf-3a6e-474d-8f44-6690a48ef967
3+
owners:
4+
- name: SUSE ITPE
5+
email: itpe-core-maintenance@suse.com

policies/harvester-pci-devices/metadata.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ annotations:
1818
io.artifacthub.keywords: harvester, virtualmachine, pci
1919
# kubewarden specific:
2020
io.kubewarden.policy.title: harvester-pci-devices
21-
io.kubewarden.policy.version: 0.1.0
21+
io.kubewarden.policy.version: 0.1.0-rc1
2222
io.kubewarden.policy.description: Prevents libvirt from binding pci devices in the wrong namespaces.
2323
io.kubewarden.policy.author: "ITPE Core Team <itpe-core-maintenance@suse.com>"
2424
io.kubewarden.policy.url: https://github.com/SUSE/openplatform-kubewarden-policies
2525
io.kubewarden.policy.source: https://github.com/SUSE/openplatform-kubewarden-policies/tree/main/policies/harvester-pci-devices
26+
io.kubewarden.policy.ociUrl: ghcr.io/suse/openplatform-kubewarden-policies/harvester-pci-devices
2627
io.kubewarden.policy.license: Apache-2.0
2728
io.kubewarden.policy.severity: critical
2829
io.kubewarden.policy.category: Resource validation

policies/harvester-restricted-network-vm/metadata.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ annotations:
1818
io.artifacthub.keywords: harvester, network, virtualmachine
1919
# kubewarden specific:
2020
io.kubewarden.policy.title: harvester-restricted-network-vm
21-
io.kubewarden.policy.version: 0.1.0
21+
io.kubewarden.policy.version: 0.1.0-rc1
2222
io.kubewarden.policy.description: Ensures harvester only creates a VM with a specified network within a restricted namespace.
2323
io.kubewarden.policy.author: "ITPE Core Team <itpe-core-maintenance@suse.com>"
2424
io.kubewarden.policy.url: https://github.com/SUSE/openplatform-kubewarden-policies
2525
io.kubewarden.policy.source: https://github.com/SUSE/openplatform-kubewarden-policies/tree/main/policies/harvester-restricted-network-vm
26+
io.kubewarden.policy.ociUrl: ghcr.io/suse/openplatform-kubewarden-policies/harvester-restricted-network
2627
io.kubewarden.policy.license: Apache-2.0
2728
io.kubewarden.policy.severity: critical
2829
io.kubewarden.policy.category: Resource validation

policies/harvester-restricted-network/metadata.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ annotations:
1818
io.artifacthub.keywords: harvester, network
1919
# kubewarden specific:
2020
io.kubewarden.policy.title: harvester-restricted-network
21-
io.kubewarden.policy.version: 0.1.0
21+
io.kubewarden.policy.version: 0.1.0-rc1
2222
io.kubewarden.policy.description: Prevents harvester from creating a network for a restricted VLAN in unauthorized namespaces.
2323
io.kubewarden.policy.author: "ITPE Core Team <itpe-core-maintenance@suse.com>"
2424
io.kubewarden.policy.url: https://github.com/SUSE/openplatform-kubewarden-policies
2525
io.kubewarden.policy.source: https://github.com/SUSE/openplatform-kubewarden-policies/tree/main/policies/harvester-restricted-network
26+
io.kubewarden.policy.ociUrl: ghcr.io/suse/openplatform-kubewarden-policies/harvester-restricted-network-vm
2627
io.kubewarden.policy.license: Apache-2.0
2728
io.kubewarden.policy.severity: critical
2829
io.kubewarden.policy.category: Resource validation

policies/istio-gateway/metadata.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,12 @@ annotations:
2020
io.artifacthub.keywords: virtualservice
2121
# kubewarden specific:
2222
io.kubewarden.policy.title: istio-gateway
23-
io.kubewarden.policy.version: 0.1.0
23+
io.kubewarden.policy.version: 0.1.0-rc1
2424
io.kubewarden.policy.description: Restrict the usage of the `Gateway` object configured on top of a dedicated instance of istio proxy only to `VirtualService` object coming from a set of namespaces.
2525
io.kubewarden.policy.author: "ITPE Core Team <itpe-core-maintenance@suse.com>"
2626
io.kubewarden.policy.url: https://github.com/SUSE/openplatform-kubewarden-policies
2727
io.kubewarden.policy.source: https://github.com/SUSE/openplatform-kubewarden-policies/tree/main/policies/istio-gateway
28+
io.kubewarden.policy.ociUrl: ghcr.io/suse/openplatform-kubewarden-policies/istio-gateway
2829
io.kubewarden.policy.license: Apache-2.0
2930
io.kubewarden.policy.severity: critical
3031
io.kubewarden.policy.category: Resource validation

policies/pod-mig-partitions/metadata.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,12 @@ annotations:
2020
io.artifacthub.keywords: pod
2121
# kubewarden specific:
2222
io.kubewarden.policy.title: pod-mig-partitions
23-
io.kubewarden.policy.version: 0.1.0
23+
io.kubewarden.policy.version: 0.1.0-rc1
2424
io.kubewarden.policy.description: Prevents assigning mig partitions without a ResourceQuota for them.
2525
io.kubewarden.policy.author: "ITPE Core Team <itpe-core-maintenance@suse.com>"
2626
io.kubewarden.policy.url: https://github.com/SUSE/openplatform-kubewarden-policies
2727
io.kubewarden.policy.source: https://github.com/SUSE/openplatform-kubewarden-policies/tree/main/policies/pod-mig-partitions
28+
io.kubewarden.policy.ociUrl: ghcr.io/suse/openplatform-kubewarden-policies/rke2-mig-partitions
2829
io.kubewarden.policy.license: Apache-2.0
2930
io.kubewarden.policy.severity: critical
3031
io.kubewarden.policy.category: Resource validation

0 commit comments

Comments
 (0)