Kubewarden

Kubewarden 1.5.0 release

Today we’re pleased to announce the availability of Kubewarden 1.5.0! This release brings the usual amount of small bug fixes, dependency updates, and a major security enhancement. Let’s take a closer look! Policy evaluation timeout The Kubewarden team is constantly working to improve the security posture of the project. As part of these efforts, we’re excited to introduce the new “policy evaluation timeout” feature. Starting from this release, Policy Server will interrupt the evaluation of admission requests after a certain amount of time has elapsed. Read more...

Kubewarden 2022 Wrapped

With 2022 almost over, it’s time to look back at what happened within the Kubewarden project during the last year. The 1.0 release A significant milestone for the project in 2022 was the release of Kubewarden v1.0.0 during the month of June. With this release, the Kubewarden team committed to the stability of all the public interfaces of the project and all its Kubernetes Custom Resource Definitions. Moreover, the project was considered ready to be used in production environments. Read more...

Community meeting is coming!

Community meetings have been a recurring demand from different sides and with the new year approaching, it’s time to make our first good resolution. To improve community feedback, the Kubewarden project has decided to organize a monthly community meeting. The first community meeting to be held is scheduled for January 12th, 2023 at 4 PM UTC. In addition to GitHub Discussions, GitHub issues, and the #kubewarden channel on the Kubernetes Slack, the community meeting is an additional avenue for the community to discuss Kubewarden and shape its future together. Read more...

Kubewarden 1.4.0 release

Today we’re pleased to announce the availability of Kubewarden 1.4.0. This version brings some minor fixes to our controller and helm charts and two new interesting features. Sigstore certificate verification Kubewarden integration with Sigstore keeps growing. Starting from this release it’s possible to verify signatures that have been produced with certificates. This can be useful to organizations that are using hardware tokens and KMS solutions to sign their container images via Sigstore. Read more...

Support for sigstore certificate signing

Secure supply chain is one of the hottest topics right now. Many organizations are implementing strategies to verify the provenance of their software starting from the development phase up to the deployment in production. Sigstore is an open source project that makes incredibly easy to sign and verify assets. Lots of open source projects and organizations are using it to sign and verify their container images, system packages and any kind of binary artifact. Read more...

Installing and Running Kubewarden In Air-Gapped Environments

We are glad to announce that deploying Kubewarden in air gap environments has been simplified and documented! For that, you will need a private OCI registry accessible by your Kubernetes cluster. Kubewarden policies are WebAssembly modules; therefore they can be stored inside an OCI-compliant registry as OCI artifacts. For an air gap installation you need to download all the Kubewarden container images and policies in your workstation, then move them to your private OCI registry. Read more...

Keeping track of Kubernetes deprecated resources

It’s fact of life: as the Kubernetes API evolves, it’s periodically reorganized or upgraded. This means some Kubernetes resources can be deprecated and later removed. We deserve to easily keep track of those deprecations and removals. For that, we have just released the deprecated-api-versions policy. A look at the deprecated-api-versions policy This policy detects the usage of Kubernetes resources that have been deprecated or removed from the Kubernetes API. The policy has two settings: Read more...

Securing the usage of volumeMounts

We present to you the new volumeMounts Policy: It inspects containers, init containers, and ephemeral containers, and restricts their usage of volumes by checking the volume name being used in the containers' volumeMounts[*].name. You can find it published in Artifact Hub. As usual, its artifact is signed with Sigstore in keyless mode, and if you are curious, you can peek into the policy’s implementation in Rust here. This new policy joins the already existing volumes-psp policy, which provides an allowlist of volume types, and hostpaths-psp policy, with an allowlist of hostPath volumes. Read more...

Enforcing compliance of container's environment variables

We’re glad to present the new environment-variable-policy to Kubewarden users. With this policy, you will now be able to inspect init containers and ephemeral containers. You can also restrict their usage by reviewing the names and values defined under the containers' env[*] field. As always, the policy can be found in ArtifactHub and all the artifacts, including the BOM files, are signed with Sigstore. What is so useful about the new environment-variable policy? Read more...

Kubewarden 1.3 is out!

The Kubewarden development team is happy to announce the release of the Kubewarden 1.3 stack. In addition to the usual amount of small fixes, this release focused on the following themes. Improve end users confidence We want our users to feel confident about using Kubewarden, knowing that good development and security practices are being followed by the Kubewarden project. We think this is particularly relevant to Kubewarden, given our users trust us to keep their Kubernetes clusters secure and compliant. Read more...

More