Skip to content

Commit 1dabb83

Browse files
authored
Merge pull request #40885 from niranjandarshann/podsecurity/standard
Fix broken link in Pod Security Standards
2 parents 195034c + 057766e commit 1dabb83

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,7 @@ fail validation.
326326
<tr>
327327
<td style="white-space: nowrap">Privilege Escalation (v1.8+)</td>
328328
<td>
329-
<p>Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
329+
<p>Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed. <em><a href="#os-specific-policy-controls">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
330330
<p><strong>Restricted Fields</strong></p>
331331
<ul>
332332
<li><code>spec.containers[*].securityContext.allowPrivilegeEscalation</code></li>
@@ -367,7 +367,7 @@ fail validation.
367367
<p><strong>Restricted Fields</strong></p>
368368
<ul>
369369
<li><code>spec.securityContext.runAsUser</code></li>
370-
<li><code>spec.containers[*].securityContext.runAsUser</code></li>
370+
<li><code>spec.containers[*].securityContext.runAsUser</code></li>
371371
<li><code>spec.initContainers[*].securityContext.runAsUser</code></li>
372372
<li><code>spec.ephemeralContainers[*].securityContext.runAsUser</code></li>
373373
</ul>
@@ -381,7 +381,7 @@ fail validation.
381381
<tr>
382382
<td style="white-space: nowrap">Seccomp (v1.19+)</td>
383383
<td>
384-
<p>Seccomp profile must be explicitly set to one of the allowed values. Both the <code>Unconfined</code> profile and the <em>absence</em> of a profile are prohibited. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
384+
<p>Seccomp profile must be explicitly set to one of the allowed values. Both the <code>Unconfined</code> profile and the <em>absence</em> of a profile are prohibited. <em><a href="#os-specific-policy-controls">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
385385
<p><strong>Restricted Fields</strong></p>
386386
<ul>
387387
<li><code>spec.securityContext.seccompProfile.type</code></li>
@@ -407,7 +407,7 @@ fail validation.
407407
<td>
408408
<p>
409409
Containers must drop <code>ALL</code> capabilities, and are only permitted to add back
410-
the <code>NET_BIND_SERVICE</code> capability. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(.spec.os.name != "windows")</code></em>
410+
the <code>NET_BIND_SERVICE</code> capability. <em><a href="#os-specific-policy-controls">This is Linux only policy</a> in v1.25+ <code>(.spec.os.name != "windows")</code></em>
411411
</p>
412412
<p><strong>Restricted Fields</strong></p>
413413
<ul>

0 commit comments

Comments
 (0)