diff --git a/apis/v1alpha2/clusternetworkpolicy_types.go b/apis/v1alpha2/clusternetworkpolicy_types.go index b007ced7..923e5a17 100644 --- a/apis/v1alpha2/clusternetworkpolicy_types.go +++ b/apis/v1alpha2/clusternetworkpolicy_types.go @@ -265,7 +265,7 @@ const ( ClusterNetworkPolicyRuleActionDeny ClusterNetworkPolicyRuleAction = "Deny" // ClusterNetworkPolicyRuleActionPass indicates that matching traffic // will jump to the next tier evaluation. That means that all the rules - // with lower priority at the same tier will be ignored, + // with lower precedence at the same tier will be ignored, // but evaluation will continue at the next tier. // For example, if an Admin tier CNP uses Pass action, // NetworkPolicy evaluation will happen next. @@ -381,7 +381,7 @@ type ClusterNetworkPolicyEgressPeer struct { // DomainNames provides a way to specify domain names as peers. // // DomainNames is only supported for Allow rules. In order to control - // access, DomainNames Allow rules should be used with a lower priority + // access, DomainNames Allow rules should be used with a lower precedence // egress deny -- this allows the admin to maintain an explicit "allowlist" // of reachable domains. // diff --git a/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml b/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml index 76ed7d75..3568b14c 100644 --- a/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml +++ b/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml @@ -197,7 +197,7 @@ spec: DomainNames provides a way to specify domain names as peers. DomainNames is only supported for Allow rules. In order to control - access, DomainNames Allow rules should be used with a lower priority + access, DomainNames Allow rules should be used with a lower precedence egress deny -- this allows the admin to maintain an explicit "allowlist" of reachable domains.