Skip to content

Commit 934feaa

Browse files
committed
slight rewording
1 parent 96bae60 commit 934feaa

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/en/blog/_posts/2023-04-05-kubescape-validating-admission-policy-library.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ The `validations` include the CEL rules for the objects. There are three differe
7676
In the event that any `spec` does not have `readOnlyRootFilesystem` set to true, the object will not be admitted.
7777

7878
{{< note >}}
79-
In our initial release, we have grouped the three expressions into the same policy object. This means they can be enabled and disabled atomically, and thus there is no chance that a user will accidentally leave a compliance gap by enabling policy for one API group and not the others. Breaking them into separate policies would allow us access to improvements targeted for the 1.27 release, including type checking. We are talking to SIG API Machinery about how to best solve this, as the APIs are developed.
79+
In our initial release, we have grouped the three expressions into the same policy object. This means they can be enabled and disabled atomically, and thus there is no chance that a user will accidentally leave a compliance gap by enabling policy for one API group and not the others. Breaking them into separate policies would allow us access to improvements targeted for the 1.27 release, including type checking. We are talking to SIG API Machinery about how to best address this before the APIs reach `v1`.
8080
{{< /note >}}
8181

8282
### Using the CEL library in your cluster

0 commit comments

Comments
 (0)