Skip to content

Commit

Permalink
Merge pull request #69 from guettli/patch-1
Browse files Browse the repository at this point in the history
typo in word "persisted"
  • Loading branch information
FabianKramm authored Dec 12, 2023
2 parents 31c90a6 + c6e7bc9 commit 1d6ab39
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/pages/fragments/policy-types.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
| Execution Order | sequential | parallel | queued |
| Expected Result | `mutate()` request object | `allow()` or `deny()` request | anything |

`Mutating` and `Validating` policies run during a HTTP request to the Kubernetes API server. After Kubernetes performs authentication and authorization (RBAC), it runs the `Mutating` policies sequentially and then runs all `Validating` policies in parallel. If any of the `Validating` policies calls `deny()`, the request will be aborted and not persited in etcd.
`Mutating` and `Validating` policies run during a HTTP request to the Kubernetes API server. After Kubernetes performs authentication and authorization (RBAC), it runs the `Mutating` policies sequentially and then runs all `Validating` policies in parallel. If any of the `Validating` policies calls `deny()`, the request will be aborted and not persisted in etcd.

`Controller` policies are **not** part of any Kubernetes API server request. Instead, they are triggered asynchronuously by `Events` in your Kubernetes cluster. Every CRUD operation on any of the Kubernetes objects in your cluster creates an `Event`. jsPolicy listens to these events and executes the matching `Controller` policies which can perform any kind of action in response to an `Event`, including also executing other CRUD operations in your cluster.

Expand Down

0 comments on commit 1d6ab39

Please sign in to comment.