diff --git a/src/__tests__/__snapshots__/index.spec.ts.snap b/src/__tests__/__snapshots__/index.spec.ts.snap index 77272a6d..af4a990b 100644 --- a/src/__tests__/__snapshots__/index.spec.ts.snap +++ b/src/__tests__/__snapshots__/index.spec.ts.snap @@ -1082,7 +1082,7 @@ exports[`transform_kubewarden allowPrivilegeEscalation 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1181,7 +1181,7 @@ exports[`transform_kubewarden allowedCapabilities 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1284,7 +1284,7 @@ exports[`transform_kubewarden allowedFlexVolumes 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1387,7 +1387,7 @@ exports[`transform_kubewarden allowedHostPaths 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1491,7 +1491,7 @@ exports[`transform_kubewarden allowedProcMountTypes 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1590,7 +1590,7 @@ exports[`transform_kubewarden allowedUnsafeSysctls 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1692,7 +1692,7 @@ exports[`transform_kubewarden apparmor 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1793,7 +1793,7 @@ exports[`transform_kubewarden defaultAddCapabilities 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1898,7 +1898,7 @@ exports[`transform_kubewarden defaultAllowPrivilegeEscalation 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -1997,7 +1997,7 @@ exports[`transform_kubewarden forbiddenSysctls 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2099,7 +2099,7 @@ exports[`transform_kubewarden fsgroup 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2204,7 +2204,7 @@ exports[`transform_kubewarden hostIPC 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2272,7 +2272,7 @@ exports[`transform_kubewarden hostNetwork 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2340,7 +2340,7 @@ exports[`transform_kubewarden hostPID 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2408,7 +2408,7 @@ exports[`transform_kubewarden hostPorts 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2481,7 +2481,7 @@ exports[`transform_kubewarden privileged 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2549,7 +2549,7 @@ exports[`transform_kubewarden readOnlyRootFilesystem 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2646,7 +2646,7 @@ exports[`transform_kubewarden requiredDropCapabilities 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2749,7 +2749,7 @@ exports[`transform_kubewarden runAsGroup 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2862,7 +2862,7 @@ exports[`transform_kubewarden runAsUser 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -2973,7 +2973,7 @@ exports[`transform_kubewarden seLinux 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -3076,7 +3076,7 @@ exports[`transform_kubewarden seccomp 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -3182,7 +3182,7 @@ exports[`transform_kubewarden supplementalGroups 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { @@ -3293,7 +3293,7 @@ exports[`transform_kubewarden volumes 1`] = ` "name": "psp-privileged", }, "spec": { - "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2", + "module": "registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3", "mutating": false, "rules": [ { diff --git a/src/kubewarden.ts b/src/kubewarden.ts index daf4e3e9..40468538 100644 --- a/src/kubewarden.ts +++ b/src/kubewarden.ts @@ -8,7 +8,7 @@ export function transform_kubewarden(PSP: k8s.V1beta1PodSecurityPolicy): object[ if ( !PSP.spec?.privileged) policies.push(mod.kubewarden_policy_helper( 'privileged', - 'registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2', + 'registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3', )) if (PSP.spec?.readOnlyRootFilesystem === true) diff --git a/tests/privileged/kubewarden.yaml b/tests/privileged/kubewarden.yaml index 260bad46..ae5a3d88 100644 --- a/tests/privileged/kubewarden.yaml +++ b/tests/privileged/kubewarden.yaml @@ -3,7 +3,7 @@ kind: ClusterAdmissionPolicy metadata: name: privileged spec: - module: registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.2 + module: registry://ghcr.io/kubewarden/policies/pod-privileged:v0.3.3 rules: - apiGroups: [""] apiVersions: ["v1"]