Docs: Fix annotations-risk-level
default value.
This commit is contained in:
parent
d27b2709c3
commit
d84c6079bf
2 changed files with 3 additions and 3 deletions
|
@ -31,7 +31,7 @@ The following table shows a configuration option's name, type, and the default v
|
||||||
| [allow-backend-server-header](#allow-backend-server-header) | bool | "false" | |
|
| [allow-backend-server-header](#allow-backend-server-header) | bool | "false" | |
|
||||||
| [allow-cross-namespace-resources](#allow-cross-namespace-resources) | bool | "false" | |
|
| [allow-cross-namespace-resources](#allow-cross-namespace-resources) | bool | "false" | |
|
||||||
| [allow-snippet-annotations](#allow-snippet-annotations) | bool | "false" | |
|
| [allow-snippet-annotations](#allow-snippet-annotations) | bool | "false" | |
|
||||||
| [annotations-risk-level](#annotations-risk-level) | string | Critical | |
|
| [annotations-risk-level](#annotations-risk-level) | string | High | |
|
||||||
| [annotation-value-word-blocklist](#annotation-value-word-blocklist) | string array | "" | |
|
| [annotation-value-word-blocklist](#annotation-value-word-blocklist) | string array | "" | |
|
||||||
| [hide-headers](#hide-headers) | string array | empty | |
|
| [hide-headers](#hide-headers) | string array | empty | |
|
||||||
| [access-log-params](#access-log-params) | string | "" | |
|
| [access-log-params](#access-log-params) | string | "" | |
|
||||||
|
@ -259,7 +259,7 @@ Represents the risk accepted on an annotation. If the risk is, for instance `Med
|
||||||
|
|
||||||
Accepted values are `Critical`, `High`, `Medium` and `Low`.
|
Accepted values are `Critical`, `High`, `Medium` and `Low`.
|
||||||
|
|
||||||
Defaults to `Critical` but will be changed to `High` on the next minor release
|
_**default:**_ `High`
|
||||||
|
|
||||||
## annotation-value-word-blocklist
|
## annotation-value-word-blocklist
|
||||||
|
|
||||||
|
|
|
@ -39,7 +39,7 @@ func (m Mock) GetDefaultBackend() defaults.Backend {
|
||||||
func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
|
func (m Mock) GetSecurityConfiguration() defaults.SecurityConfiguration {
|
||||||
defRisk := m.AnnotationsRiskLevel
|
defRisk := m.AnnotationsRiskLevel
|
||||||
if defRisk == "" {
|
if defRisk == "" {
|
||||||
defRisk = "Critical"
|
defRisk = "High"
|
||||||
}
|
}
|
||||||
return defaults.SecurityConfiguration{
|
return defaults.SecurityConfiguration{
|
||||||
AnnotationsRiskLevel: defRisk,
|
AnnotationsRiskLevel: defRisk,
|
||||||
|
|
Loading…
Reference in a new issue