From 61bf8d0a4b9b3f596474dcd0cd6db7c1837aabf6 Mon Sep 17 00:00:00 2001 From: Ishaan Date: Mon, 30 Dec 2024 10:05:58 +0000 Subject: [PATCH] updated kyverno version --- charts/best-practices-k8s/pols/require_drop_all.yaml | 3 ++- .../pod-security-restricted/pols/restrict-volume-types.yaml | 4 ++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/charts/best-practices-k8s/pols/require_drop_all.yaml b/charts/best-practices-k8s/pols/require_drop_all.yaml index 5dbe44ed..35d55177 100644 --- a/charts/best-practices-k8s/pols/require_drop_all.yaml +++ b/charts/best-practices-k8s/pols/require_drop_all.yaml @@ -7,6 +7,7 @@ metadata: policies.kyverno.io/category: Best Practices policies.kyverno.io/severity: medium policies.kyverno.io/minversion: 1.6.0 + kyverno.io/kyverno-version: 1.10.0 policies.kyverno.io/subject: Pod policies.kyverno.io/description: >- Capabilities permit privileged actions without giving full root access. All @@ -15,7 +16,7 @@ metadata: ability. Note that this policy also illustrates how to cover drop entries in any case although this may not strictly conform to the Pod Security Standards. spec: - validationFailureAction: audit + validationFailureAction: Audit background: true rules: - name: require-drop-all diff --git a/charts/pod-security-restricted/pols/restrict-volume-types.yaml b/charts/pod-security-restricted/pols/restrict-volume-types.yaml index 99243db7..a888e806 100644 --- a/charts/pod-security-restricted/pols/restrict-volume-types.yaml +++ b/charts/pod-security-restricted/pols/restrict-volume-types.yaml @@ -9,13 +9,13 @@ metadata: policies.kyverno.io/subject: Pod,Volume policies.kyverno.io/minversion: 1.6.0 kyverno.io/kubernetes-version: "1.22-1.23" - kyverno.io/kyverno-version: 1.6.0 + kyverno.io/kyverno-version: 1.10.0 policies.kyverno.io/description: >- In addition to restricting HostPath volumes, the restricted pod security profile limits usage of non-core volume types to those defined through PersistentVolumes. This policy blocks any other type of volume other than those in the allow list. spec: - validationFailureAction: audit + validationFailureAction: Audit background: true rules: - name: restricted-volumes