summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorXingcai Zhang <zhangxingcai@ghostcloud.cn>2017-10-22 15:13:21 +0800
committerXingcai Zhang <zhangxingcai@ghostcloud.cn>2017-10-23 09:14:11 +0800
commit0686710d263df6aa7d6fdc202eb82b7aff8655d9 (patch)
treeadb3809c8a353aca37bc9dfb65c828e09c1e4f70
parente4a0208c8475a9f50f677c51c92a8c2cb5168977 (diff)
Fix some misspelled words to Supersede
-rw-r--r--contributors/design-proposals/api-machinery/admission_control_extension.md2
-rw-r--r--contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md6
2 files changed, 4 insertions, 4 deletions
diff --git a/contributors/design-proposals/api-machinery/admission_control_extension.md b/contributors/design-proposals/api-machinery/admission_control_extension.md
index a3be032f..70343623 100644
--- a/contributors/design-proposals/api-machinery/admission_control_extension.md
+++ b/contributors/design-proposals/api-machinery/admission_control_extension.md
@@ -68,7 +68,7 @@ Name | Code | Description
AlwaysPullImages | alwayspullimages/admission.go | Forces the Kubelet to pull images to prevent pods from accessing private images that another user with credentials has already pulled to the node.
LimitPodHardAntiAffinityTopology | antiaffinity/admission.go | Defended the cluster against abusive anti-affinity topology rules that might hang the scheduler.
DenyEscalatingExec | exec/admission.go | Prevent users from executing into pods that have higher privileges via their service account than allowed by their policy (regular users can't exec into admin pods).
-DenyExecOnPrivileged | exec/admission.go | Blanket ban exec access to pods with host level security. Superceded by DenyEscalatingExec
+DenyExecOnPrivileged | exec/admission.go | Blanket ban exec access to pods with host level security. Superseded by DenyEscalatingExec
OwnerReferencesPermissionEnforcement | gc/gc_admission.go | Require that a user who sets a owner reference (which could result in garbage collection) has permission to delete the object, to prevent abuse.
ImagePolicyWebhook | imagepolicy/admission.go | Invoke a remote API to determine whether an image is allowed to run on the cluster.
PodNodeSelector | podnodeselector/admission.go | Default and limit what node selectors may be used within a namespace by reading a namespace annotation and a global configuration.
diff --git a/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md b/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md
index 82bf9320..5477a9b3 100644
--- a/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md
+++ b/contributors/design-proposals/architecture/1-kubernetes-enhancement-proposal-process.md
@@ -188,7 +188,7 @@ Metadata items:
* **owning-sig** Required
* The SIG that is most closely associated with this KEP. If there is code or
other artifacts that will result from this KEP, then it is expected that
- this SIG will take responsiblity for the bulk of those artificats.
+ this SIG will take responsiblity for the bulk of those artifacts.
* Sigs are listed as `sig-abc-def` where the name matches up with the
directory in the `kubernetes/community` repo.
* **participating-sigs** Optional
@@ -219,10 +219,10 @@ Metadata items:
* In the form `KEP-123`
* **replaces** Optional
* A list of KEPs that this KEP replaces. Those KEPs should list this KEP in
- their `superceded-by`.
+ their `superseded-by`.
* In the form `KEP-123`
* **superseded-by**
- * A list of KEPs that superced this KEP. Use of this should be paired with
+ * A list of KEPs that supersede this KEP. Use of this should be paired with
this KEP moving into the `Replaced` status.
* In the form `KEP-123`