policy
Here are 468 public repositories matching this topic...
Describe the solution you'd like
Validate test commands arguments before Run. This pattern will allow us to governance behaviors such as flags/arguments validation in all commands. Additionally, this should make the code easier to understand and maintain.
Requirements
Golang basic level.
“How to Implement” suggestion
See [issue](datreeio/datree#4
-
Updated
Feb 16, 2022 - Sass
-
Updated
May 1, 2022
-
Updated
May 26, 2022 - C
-
Updated
May 23, 2022 - HTML
-
Updated
Mar 3, 2022 - AGS Script
-
Updated
May 25, 2022
-
Updated
May 3, 2022
-
Updated
Dec 25, 2020 - Python
See https://github.blog/2022-05-09-supercharging-github-actions-with-job-summaries/
Instead of (or in addition to) posting a comment on the PR, we could generate a nice looking summary by emitting the Markdown content.
-
Updated
May 28, 2022
-
Updated
May 27, 2022 - Python
-
Updated
May 26, 2022 - Java
-
Updated
May 27, 2022 - Go
-
Updated
Feb 28, 2022 - Go
-
Updated
May 23, 2022 - Open Policy Agent
Feature Request
Short Description
Currently, the GRPC server port [is a configuration](https://github.com/kubearmor/KubeArmor/blob/bf39613c0c01e986d3e77d2f46a59c526cbf5907/KubeArmor/config/config.go#L79) and the default value is 32767.
This works fine on kubearmor in
The repository for the helmfile project is changed from https://github.com/roboll/helmfile to https://github.com/helmfile/helmfile.
This PR changes the URL in e2e/README.md to reflect this change.
There is still a reference to the old repository in .github/workflows/e2e.yaml:36. This reference must be updated after there is a release present in
-
Updated
May 24, 2022 - C++
-
Updated
Aug 27, 2018 - HTML
-
Updated
May 28, 2022 - Go
-
Updated
May 27, 2022 - Go
-
Updated
May 28, 2022 - Go
-
Updated
Jun 13, 2020 - Go
-
Updated
May 27, 2022 - HTML
-
Updated
Feb 4, 2022 - Python
Improve this page
Add a description, image, and links to the policy topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the policy topic, visit your repo's landing page and select "manage topics."


Saw this rule in the clj-kondo linter, and I think it would be a good addition to our strict mode. Having duplicate elements in sets is probably always a mistake in a production policy, and while it's "harmless", the intent is likely to provide another element rather than the duplicate, leading to an unexpected