diff --git a/charts/pod-security-restricted/Chart.yaml b/charts/pod-security-restricted/Chart.yaml index a8ce9afd..e827d893 100644 --- a/charts/pod-security-restricted/Chart.yaml +++ b/charts/pod-security-restricted/Chart.yaml @@ -2,7 +2,7 @@ apiVersion: v2 name: pss-restricted-policies description: Pod Security Standards (restricted) policy set type: application -version: 0.4.0-rc.1 +version: 0.4.0-rc.2 appVersion: 0.1.0 keywords: - kubernetes diff --git a/charts/pod-security-restricted/pols/disallow-privilege-escalation.yaml b/charts/pod-security-restricted/pols/disallow-privilege-escalation.yaml index c7f8b49d..c817e118 100644 --- a/charts/pod-security-restricted/pols/disallow-privilege-escalation.yaml +++ b/charts/pod-security-restricted/pols/disallow-privilege-escalation.yaml @@ -10,7 +10,7 @@ metadata: kyverno.io/kyverno-version: 1.10.0 kyverno.io/kubernetes-version: "1.22-1.23" policies.nirmata.io/remediation-docs: "https://docs.nirmata.io/policysets/podsecurity/restricted/disallow-privilege-escalation/" - policies.nirmata.io/remediation: "https://github.com/nirmata/kyverno-policies/tree/main/pod-security/restricted/disallow-privilege-escalation/remediate-diallow-privilege-escalation.yaml" + policies.nirmata.io/remediation: "https://github.com/nirmata/kyverno-policies/tree/main/pod-security/restricted/disallow-privilege-escalation/remediate-disallow-privilege-escalation.yaml" policies.kyverno.io/description: >- Privilege escalation, such as via set-user-ID or set-group-ID file mode, should not be allowed. This policy ensures the `allowPrivilegeEscalation` field is set to `false`. diff --git a/pod-security/restricted/disallow-privilege-escalation/disallow-privilege-escalation.yaml b/pod-security/restricted/disallow-privilege-escalation/disallow-privilege-escalation.yaml index fcfd8822..ec7bd217 100644 --- a/pod-security/restricted/disallow-privilege-escalation/disallow-privilege-escalation.yaml +++ b/pod-security/restricted/disallow-privilege-escalation/disallow-privilege-escalation.yaml @@ -9,7 +9,7 @@ metadata: policies.kyverno.io/subject: Pod kyverno.io/kubernetes-version: "1.22-1.23" policies.nirmata.io/remediation-docs: "https://docs.nirmata.io/policysets/podsecurity/restricted/disallow-privilege-escalation/" - policies.nirmata.io/remediation: "https://github.com/nirmata/kyverno-policies/tree/main/pod-security/restricted/disallow-privilege-escalation/remediate-diallow-privilege-escalation.yaml" + policies.nirmata.io/remediation: "https://github.com/nirmata/kyverno-policies/tree/main/pod-security/restricted/disallow-privilege-escalation/remediate-disallow-privilege-escalation.yaml" policies.kyverno.io/description: >- Privilege escalation, such as via set-user-ID or set-group-ID file mode, should not be allowed. This policy ensures the fields