diff --git a/pkg/api/validation/validation.go b/pkg/api/validation/validation.go index 2c6e2749d37..795cf5a6103 100644 --- a/pkg/api/validation/validation.go +++ b/pkg/api/validation/validation.go @@ -3504,7 +3504,7 @@ func ValidateSecurityContext(sc *api.SecurityContext, fldPath *field.Path) field if sc.Privileged != nil { if *sc.Privileged && !capabilities.Get().AllowPrivileged { - allErrs = append(allErrs, field.Forbidden(fldPath.Child("privileged"), "disallowed by policy")) + allErrs = append(allErrs, field.Forbidden(fldPath.Child("privileged"), "disallowed by cluster policy")) } } diff --git a/pkg/api/validation/validation_test.go b/pkg/api/validation/validation_test.go index 47450668ac2..58b64bd437a 100644 --- a/pkg/api/validation/validation_test.go +++ b/pkg/api/validation/validation_test.go @@ -8155,7 +8155,7 @@ func TestValidateSecurityContext(t *testing.T) { "request privileged when capabilities forbids": { sc: privRequestWithGlobalDeny, errorType: "FieldValueForbidden", - errorDetail: "disallowed by policy", + errorDetail: "disallowed by cluster policy", }, "negative RunAsUser": { sc: negativeRunAsUser,