From 6c0631bcf9e1b17057bae12e35ecfe4d08907f94 Mon Sep 17 00:00:00 2001 From: Nadia Pinaeva Date: Wed, 27 Aug 2025 11:37:36 +0200 Subject: [PATCH] [CRD doc] replace "lower priority" with "lower precedence". Signed-off-by: Nadia Pinaeva --- apis/v1alpha2/clusternetworkpolicy_types.go | 4 ++-- .../policy.networking.k8s.io_clusternetworkpolicies.yaml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/apis/v1alpha2/clusternetworkpolicy_types.go b/apis/v1alpha2/clusternetworkpolicy_types.go index b007ced7..923e5a17 100644 --- a/apis/v1alpha2/clusternetworkpolicy_types.go +++ b/apis/v1alpha2/clusternetworkpolicy_types.go @@ -265,7 +265,7 @@ const ( ClusterNetworkPolicyRuleActionDeny ClusterNetworkPolicyRuleAction = "Deny" // ClusterNetworkPolicyRuleActionPass indicates that matching traffic // will jump to the next tier evaluation. That means that all the rules - // with lower priority at the same tier will be ignored, + // with lower precedence at the same tier will be ignored, // but evaluation will continue at the next tier. // For example, if an Admin tier CNP uses Pass action, // NetworkPolicy evaluation will happen next. @@ -381,7 +381,7 @@ type ClusterNetworkPolicyEgressPeer struct { // DomainNames provides a way to specify domain names as peers. // // DomainNames is only supported for Allow rules. In order to control - // access, DomainNames Allow rules should be used with a lower priority + // access, DomainNames Allow rules should be used with a lower precedence // egress deny -- this allows the admin to maintain an explicit "allowlist" // of reachable domains. // diff --git a/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml b/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml index 76ed7d75..3568b14c 100644 --- a/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml +++ b/config/crd/experimental/policy.networking.k8s.io_clusternetworkpolicies.yaml @@ -197,7 +197,7 @@ spec: DomainNames provides a way to specify domain names as peers. DomainNames is only supported for Allow rules. In order to control - access, DomainNames Allow rules should be used with a lower priority + access, DomainNames Allow rules should be used with a lower precedence egress deny -- this allows the admin to maintain an explicit "allowlist" of reachable domains.