Skip to content

Commit eefc776

Browse files
authored
Fix typos in Markdown links. (#32802)
* Fix typos in Markdown links. * Test Co-authored-by: Mads Jensen <[email protected]>
1 parent d8dfd81 commit eefc776

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -782,7 +782,7 @@ This admission controller will deny any Pod that attempts to set certain escalat
782782
fields, as shown in the
783783
[Configure a Security Context for a Pod or Container](/docs/tasks/configure-pod-container/security-context/)
784784
task.
785-
If you don't use [Pod Security admission]((/docs/concepts/security/pod-security-admission/),
785+
If you don't use [Pod Security admission](/docs/concepts/security/pod-security-admission/),
786786
[PodSecurityPolicies](/docs/concepts/security/pod-security-policy/), nor any external enforcement mechanism,
787787
then you could use this admission controller to restrict the set of values a security context can take.
788788

content/en/docs/tasks/administer-cluster/securing-a-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,7 +243,7 @@ like the `kube-system` namespace, because those pods can gain access to service
243243
or run with elevated permissions if those service accounts are granted access to permissive
244244
[PodSecurityPolicies](/docs/concepts/security/pod-security-policy/).
245245

246-
If you use [Pod Security admission]((/docs/concepts/security/pod-security-admission/) and allow
246+
If you use [Pod Security admission](/docs/concepts/security/pod-security-admission/) and allow
247247
any component to create Pods within a namespace that permits privileged Pods, those Pods may
248248
be able to escape their containers and use this widened access to elevate their privileges.
249249

0 commit comments

Comments
 (0)