From 8dd285ed02c0d8538ebb40695796b2f6f3749573 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Oct 2023 01:41:26 +0000 Subject: [PATCH 1/2] chore(deps): update kubewarden/github-actions action to v3.1.10 --- .github/workflows/release.yml | 4 ++-- .github/workflows/test.yml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 09e13b7..3d1b5a6 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -11,7 +11,7 @@ jobs: test: name: run tests and linters - uses: kubewarden/github-actions/.github/workflows/reusable-test-policy-rust.yml@v3.1.9 + uses: kubewarden/github-actions/.github/workflows/reusable-test-policy-rust.yml@v3.1.10 release: needs: test @@ -23,6 +23,6 @@ jobs: # Required by cosign keyless signing id-token: write - uses: kubewarden/github-actions/.github/workflows/reusable-release-policy-rust.yml@v3.1.9 + uses: kubewarden/github-actions/.github/workflows/reusable-release-policy-rust.yml@v3.1.10 with: oci-target: ghcr.io/kubewarden/policies/env-variable-secrets-scanner diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index 8c60549..ccee91f 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -3,4 +3,4 @@ name: Continuous integration jobs: test: name: run tests and linters - uses: kubewarden/github-actions/.github/workflows/reusable-test-policy-rust.yml@v3.1.9 + uses: kubewarden/github-actions/.github/workflows/reusable-test-policy-rust.yml@v3.1.10 From 205f3401b4ff7d5a864670c0902f84dcec08a9f8 Mon Sep 17 00:00:00 2001 From: Flavio Castelli Date: Mon, 16 Oct 2023 09:39:51 +0200 Subject: [PATCH 2/2] chore: fix artifacthub metadata Signed-off-by: Flavio Castelli --- artifacthub-pkg.yml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/artifacthub-pkg.yml b/artifacthub-pkg.yml index 7cf3ab5..ee85d4c 100644 --- a/artifacthub-pkg.yml +++ b/artifacthub-pkg.yml @@ -7,7 +7,7 @@ version: 0.1.7 name: env-variable-secrets-scanner displayName: Environment Variable Secrets Scanner -createdAt: 2023-07-07T19:14:30.193712924Z +createdAt: 2023-10-16T07:39:38.035662785Z description: Policy that inspects env vars and rejects a request if a secret was found license: Apache-2.0 homeURL: https://github.com/kubewarden/env-variable-secrets-scanner-policy @@ -31,6 +31,10 @@ install: | ```console kwctl pull ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.7 ``` + Then, generate the policy manifest and tune it to your liking. For example: + ```console + kwctl scaffold manifest -t ClusterAdmissionPolicy registry://ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.7 + ``` maintainers: - name: Kubewarden developers email: cncf-kubewarden-maintainers@lists.cncf.io