rules: - apiGroups: [""] apiVersions: ["v1"] resources: ["pods"] operations: ["CREATE"] mutating: false contextAwareResources: [] executionMode: kubewarden-wapc # Consider the policy for the background audit scans. Default is true. Note the # intrinsic limitations of the background audit feature on docs.kubewarden.io; # If your policy hits any limitations, set to false for the audit feature to # skip this policy and not generate false positives. backgroundAudit: true annotations: # artifacthub specific: io.artifacthub.displayName: Policy Name io.artifacthub.resources: Pod io.artifacthub.keywords: pod, cool policy, kubewarden io.kubewarden.policy.ociUrl: ghcr.io/kubewarden/policies/demo # kubewarden specific: io.kubewarden.policy.title: demo io.kubewarden.policy.description: Short description io.kubewarden.policy.author: Miguel Campos io.kubewarden.policy.url: https://github.com/yourorg/demo io.kubewarden.policy.source: https://github.com/yourorg/demo io.kubewarden.policy.license: Apache-2.0 # The next two annotations are used in the policy report generated by the # Audit scanner. Severity indicates policy check result criticality and # Category indicates policy category. See more here at docs.kubewarden.io io.kubewarden.policy.severity: medium io.kubewarden.policy.category: Resource validation