diff options
| author | Xingcai Zhang <zhangxingcai@ghostcloud.cn> | 2017-10-22 15:13:21 +0800 |
|---|---|---|
| committer | Xingcai Zhang <zhangxingcai@ghostcloud.cn> | 2017-10-23 09:14:11 +0800 |
| commit | 0686710d263df6aa7d6fdc202eb82b7aff8655d9 (patch) | |
| tree | adb3809c8a353aca37bc9dfb65c828e09c1e4f70 | |
| parent | e4a0208c8475a9f50f677c51c92a8c2cb5168977 (diff) | |
Fix some misspelled words to Supersede
| -rw-r--r-- | contributors/design-proposals/api-machinery/admission_control_extension.md | 2 | ||||
| -rw-r--r-- | contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/contributors/design-proposals/api-machinery/admission_control_extension.md b/contributors/design-proposals/api-machinery/admission_control_extension.md index a3be032f..70343623 100644 --- a/contributors/design-proposals/api-machinery/admission_control_extension.md +++ b/contributors/design-proposals/api-machinery/admission_control_extension.md @@ -68,7 +68,7 @@ Name | Code | Description AlwaysPullImages | alwayspullimages/admission.go | Forces the Kubelet to pull images to prevent pods from accessing private images that another user with credentials has already pulled to the node. LimitPodHardAntiAffinityTopology | antiaffinity/admission.go | Defended the cluster against abusive anti-affinity topology rules that might hang the scheduler. DenyEscalatingExec | exec/admission.go | Prevent users from executing into pods that have higher privileges via their service account than allowed by their policy (regular users can't exec into admin pods). -DenyExecOnPrivileged | exec/admission.go | Blanket ban exec access to pods with host level security. Superceded by DenyEscalatingExec +DenyExecOnPrivileged | exec/admission.go | Blanket ban exec access to pods with host level security. Superseded by DenyEscalatingExec OwnerReferencesPermissionEnforcement | gc/gc_admission.go | Require that a user who sets a owner reference (which could result in garbage collection) has permission to delete the object, to prevent abuse. ImagePolicyWebhook | imagepolicy/admission.go | Invoke a remote API to determine whether an image is allowed to run on the cluster. PodNodeSelector | podnodeselector/admission.go | Default and limit what node selectors may be used within a namespace by reading a namespace annotation and a global configuration. diff --git a/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md b/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md index 82bf9320..5477a9b3 100644 --- a/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md +++ b/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md @@ -188,7 +188,7 @@ Metadata items: * **owning-sig** Required * The SIG that is most closely associated with this KEP. If there is code or other artifacts that will result from this KEP, then it is expected that - this SIG will take responsiblity for the bulk of those artificats. + this SIG will take responsiblity for the bulk of those artifacts. * Sigs are listed as `sig-abc-def` where the name matches up with the directory in the `kubernetes/community` repo. * **participating-sigs** Optional @@ -219,10 +219,10 @@ Metadata items: * In the form `KEP-123` * **replaces** Optional * A list of KEPs that this KEP replaces. Those KEPs should list this KEP in - their `superceded-by`. + their `superseded-by`. * In the form `KEP-123` * **superseded-by** - * A list of KEPs that superced this KEP. Use of this should be paired with + * A list of KEPs that supersede this KEP. Use of this should be paired with this KEP moving into the `Replaced` status. * In the form `KEP-123` |
