Skip to content

Commit a6f829f

Browse files
committed
update denyexeconprivileged removal to release 1.21
update denyexeconprivileged removal to release 1.21 update denyexeconprivileged removal to release 1.21
1 parent 53a1678 commit a6f829f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ The default value for `default-not-ready-toleration-seconds` and `default-unreac
176176
This admission controller will intercept all requests to exec a command in a pod if that pod has a privileged container.
177177

178178
This functionality has been merged into [DenyEscalatingExec](#denyescalatingexec).
179-
The DenyExecOnPrivileged admission plugin is deprecated and will be removed in v1.18.
179+
The DenyExecOnPrivileged admission plugin is deprecated.
180180

181181
Use of a policy-based admission plugin (like [PodSecurityPolicy](#podsecuritypolicy) or a custom admission plugin)
182182
which can be targeted at specific users or Namespaces and also protects against creation of overly privileged Pods
@@ -190,7 +190,7 @@ This admission controller will deny exec and attach commands to pods that run wi
190190
allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and
191191
have access to the host PID namespace.
192192

193-
The DenyEscalatingExec admission plugin is deprecated and will be removed in v1.18.
193+
The DenyEscalatingExec admission plugin is deprecated.
194194

195195
Use of a policy-based admission plugin (like [PodSecurityPolicy](#podsecuritypolicy) or a custom admission plugin)
196196
which can be targeted at specific users or Namespaces and also protects against creation of overly privileged Pods

0 commit comments

Comments
 (0)