Skip to content

Commit 294ee64

Browse files
committed
chore: update policy to release dependencies bumps.
Updates the version of the policy to allow a new release with the latest dependencies bumps. Signed-off-by: José Guilherme Vanz <[email protected]>
1 parent d7c7707 commit 294ee64

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

Cargo.lock

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "env-variable-secrets-scanner-policy"
3-
version = "0.1.7"
3+
version = "0.1.8"
44
authors = ["raulcabello <[email protected]>"]
55
edition = "2018"
66

artifacthub-pkg.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@
44
#
55
# This config can be saved to its default location with:
66
# kwctl scaffold artifacthub > artifacthub-pkg.yml
7-
version: 0.1.7
7+
version: 0.1.8
88
name: env-variable-secrets-scanner
99
displayName: Environment Variable Secrets Scanner
10-
createdAt: 2023-10-16T07:39:38.035662785Z
10+
createdAt: 2025-03-10T12:24:35.376615395Z
1111
description: Policy that inspects env vars and rejects a request if a secret was found
1212
license: Apache-2.0
1313
homeURL: https://github.com/kubewarden/env-variable-secrets-scanner-policy
1414
containersImages:
1515
- name: policy
16-
image: ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.7
16+
image: ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.8
1717
keywords:
1818
- secrets
1919
- api keys
@@ -23,17 +23,17 @@ keywords:
2323
- confidential data leak
2424
links:
2525
- name: policy
26-
url: https://github.com/kubewarden/env-variable-secrets-scanner-policy/releases/download/v0.1.7/policy.wasm
26+
url: https://github.com/kubewarden/env-variable-secrets-scanner-policy/releases/download/v0.1.8/policy.wasm
2727
- name: source
2828
url: https://github.com/kubewarden/env-variable-secrets-scanner-policy
2929
install: |
3030
The policy can be obtained using [`kwctl`](https://github.com/kubewarden/kwctl):
3131
```console
32-
kwctl pull ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.7
32+
kwctl pull ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.8
3333
```
3434
Then, generate the policy manifest and tune it to your liking. For example:
3535
```console
36-
kwctl scaffold manifest -t ClusterAdmissionPolicy registry://ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.7
36+
kwctl scaffold manifest -t ClusterAdmissionPolicy registry://ghcr.io/kubewarden/policies/env-variable-secrets-scanner:v0.1.8
3737
```
3838
maintainers:
3939
- name: Kubewarden developers

0 commit comments

Comments
 (0)