diff --git a/samples/best_practices/disallow_helm_tiller.yaml b/samples/best_practices/disallow_helm_tiller.yaml index e0ddbf313a..526bf12bfa 100644 --- a/samples/best_practices/disallow_helm_tiller.yaml +++ b/samples/best_practices/disallow_helm_tiller.yaml @@ -4,8 +4,7 @@ metadata: name: disallow-helm-tiller annotations: policies.kyverno.io/category: Security - policies.kyverno.io/description: Tiller has known security challenges. It requires adminstrative privileges and acts as a shared - resource accessible to any authenticated user. Tiller can lead to privilge escalation as restricted users can impact other users. + policies.kyverno.io/description: Tiller has known security challenges. It requires adminstrative privileges and acts as a shared resource accessible to any authenticated user. Tiller can lead to privilge escalation as restricted users can impact other users. spec: rules: - name: validate-helm-tiller diff --git a/test/output/pod-with-emptydir.yaml b/test/output/pod-with-emptydir.yaml index 73da950f49..e7bc8b2897 100644 --- a/test/output/pod-with-emptydir.yaml +++ b/test/output/pod-with-emptydir.yaml @@ -3,7 +3,7 @@ kind: Pod metadata: name: pod-with-emptydir annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" + cluster-autoscaler.kubernetes.io/safe-to-evict: true spec: containers: - image: k8s.gcr.io/test-webserver diff --git a/test/output/pod-with-hostpath.yaml b/test/output/pod-with-hostpath.yaml index b011aa1e09..30d6801b05 100644 --- a/test/output/pod-with-hostpath.yaml +++ b/test/output/pod-with-hostpath.yaml @@ -3,7 +3,7 @@ kind: Pod metadata: name: pod-with-hostpath annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" + cluster-autoscaler.kubernetes.io/safe-to-evict: true spec: containers: - image: k8s.gcr.io/test-webserver