Skip to content

Commit

Permalink
Update ghcr.io/kubewarden/policies/pod-privileged Docker tag to v0.3.3
Browse files Browse the repository at this point in the history
  • Loading branch information
renovate[bot] authored Feb 11, 2025
1 parent cb28a41 commit 238e5d3
Show file tree
Hide file tree
Showing 3 changed files with 26 additions and 26 deletions.
48 changes: 24 additions & 24 deletions src/__tests__/__snapshots__/index.spec.ts.snap
Original file line number Diff line number Diff line change
Expand Up @@ -1082,7 +1082,7 @@ exports[`transform_kubewarden allowPrivilegeEscalation 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1181,7 +1181,7 @@ exports[`transform_kubewarden allowedCapabilities 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1284,7 +1284,7 @@ exports[`transform_kubewarden allowedFlexVolumes 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1387,7 +1387,7 @@ exports[`transform_kubewarden allowedHostPaths 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1491,7 +1491,7 @@ exports[`transform_kubewarden allowedProcMountTypes 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1590,7 +1590,7 @@ exports[`transform_kubewarden allowedUnsafeSysctls 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1692,7 +1692,7 @@ exports[`transform_kubewarden apparmor 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1793,7 +1793,7 @@ exports[`transform_kubewarden defaultAddCapabilities 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1898,7 +1898,7 @@ exports[`transform_kubewarden defaultAllowPrivilegeEscalation 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -1997,7 +1997,7 @@ exports[`transform_kubewarden forbiddenSysctls 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2099,7 +2099,7 @@ exports[`transform_kubewarden fsgroup 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2204,7 +2204,7 @@ exports[`transform_kubewarden hostIPC 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2272,7 +2272,7 @@ exports[`transform_kubewarden hostNetwork 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2340,7 +2340,7 @@ exports[`transform_kubewarden hostPID 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2408,7 +2408,7 @@ exports[`transform_kubewarden hostPorts 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2481,7 +2481,7 @@ exports[`transform_kubewarden privileged 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2549,7 +2549,7 @@ exports[`transform_kubewarden readOnlyRootFilesystem 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2646,7 +2646,7 @@ exports[`transform_kubewarden requiredDropCapabilities 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2749,7 +2749,7 @@ exports[`transform_kubewarden runAsGroup 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2862,7 +2862,7 @@ exports[`transform_kubewarden runAsUser 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -2973,7 +2973,7 @@ exports[`transform_kubewarden seLinux 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -3076,7 +3076,7 @@ exports[`transform_kubewarden seccomp 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -3182,7 +3182,7 @@ exports[`transform_kubewarden supplementalGroups 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down Expand Up @@ -3293,7 +3293,7 @@ exports[`transform_kubewarden volumes 1`] = `
"name": "psp-privileged",
},
"spec": {
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2",
"module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3",
"mutating": false,
"rules": [
{
Expand Down
2 changes: 1 addition & 1 deletion src/kubewarden.ts
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ export function transform_kubewarden(PSP: k8s.V1beta1PodSecurityPolicy): object[
if ( !PSP.spec?.privileged)
policies.push(mod.kubewarden_policy_helper(
'privileged',
'registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2',
'registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3',
))

if (PSP.spec?.readOnlyRootFilesystem === true)
Expand Down
2 changes: 1 addition & 1 deletion tests/privileged/kubewarden.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ kind: ClusterAdmissionPolicy
metadata:
name: privileged
spec:
module: registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2
module: registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3
rules:
- apiGroups: [""]
apiVersions: ["v1"]
Expand Down

0 comments on commit 238e5d3

Please sign in to comment.