github-actions
by kubewarden
A collection of reusable GitHub Actions and workflows designed to automate Kubewarden policy testing and release processes.
GitHub actions used by the Kubewarden project
Primary Use Case
This tool is used by developers and DevSecOps teams working with Kubewarden policies to automate testing and release workflows within GitHub. It streamlines continuous integration and deployment by providing pre-built GitHub Actions tailored for Kubewarden policy lifecycle management.
- Collection of GitHub Actions specific to Kubewarden
- Reusable workflows for policy testing
- Reusable workflows for policy release
- Versioning support with semver tags and branch management
- Self-consuming release process to ensure consistency
- Stable and actively maintained with clear release guidelines
Installation
- Use the GitHub Actions directly within your GitHub workflows by referencing the repository
- For versioning, use semver tags (v2 and upwards) or the v1 branch for older versions
- Update action tags in workflows before tagging a new release to ensure self-consumption
- Tag releases using semantic versioning (e.g., v2.3.0)
Usage
>_ Use reusable workflows in your GitHub Actions YAML filesIntegrate Kubewarden policy testing and release workflows by referencing this repository's actions and workflows
>_ Tag releases with semantic versioning (e.g., v2.3.0)Create new release tags to manage versions of the GitHub Actions
>_ Update action tags in workflows before tagging a releaseEnsure the repository's own workflows consume the new version of the actions
- Integrate Kubewarden GitHub Actions into CI/CD pipelines to automate continuous policy testing and enforcement, reducing human error and improving security posture.
- Leverage reusable workflows to standardize security policy releases across multiple teams, enhancing consistency and compliance.
- Combine with container scanning tools to create a comprehensive container security automation framework.
- Use versioning and self-consuming release processes to maintain traceability and auditability of security policy changes.
- Enable purple teams to simulate policy bypass scenarios by modifying workflows, enhancing detection and response capabilities.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about github-actions. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools

portainer
portainer/portainer
Making Docker and Kubernetes management easy.
slim
slimtoolkit/slim
Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
kubescape
kubescape/kubescape
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
kube-bench
aquasecurity/kube-bench
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
kubernetes-learning-path
techiescamp/kubernetes-learning-path
A roadmap to learn Kubernetes from scratch (Beginner to Advanced level)
kata-containers
kata-containers/kata-containers
Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
