Skip to content

Commit e058524

Browse files
committed
sed s/KCP/kcp/g in the docs
On-behalf-of: @SAP [email protected]
1 parent ff05162 commit e058524

File tree

9 files changed

+132
-115
lines changed

9 files changed

+132
-115
lines changed

cli/cmd/kubectl-kcp/cmd/kubectlKcp.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,17 +37,17 @@ import (
3737
func KubectlKcpCommand() *cobra.Command {
3838
root := &cobra.Command{
3939
Use: "kcp",
40-
Short: "kubectl plugin for KCP",
40+
Short: "kubectl plugin for kcp",
4141
Long: help.Doc(`
42-
KCP is the easiest way to manage Kubernetes applications against one or
42+
kcp is the easiest way to manage Kubernetes applications against one or
4343
more clusters, by giving you a personal control plane that schedules your
4444
workloads onto one or many clusters, and making it simple to pick up and
4545
move. Advanced use cases including spreading your apps across clusters for
4646
resiliency, scheduling batch workloads onto clusters with free capacity,
4747
and enabling collaboration for individual teams without having access to
4848
the underlying clusters.
4949
50-
This command provides KCP specific sub-command for kubectl.
50+
This command provides kcp-specific sub-command for kubectl.
5151
`),
5252
SilenceUsage: true,
5353
SilenceErrors: true,

docs/content/concepts/authentication/index.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ For detailed instructions on running kcp with a specific authentication strategy
1313

1414
- [OIDC]
1515

16-
## KCP Front Proxy Authentication
16+
## kcp Front Proxy Authentication
1717

1818
kcp-front-proxy is a reverse proxy that accepts client certificates and forwards Common Name (as username) and Organizations (as groups) to the backend API servers in HTTP headers. The proxy terminates TLS and communicates with API servers via mTLS. Traffic is routed based on paths.
1919

@@ -50,30 +50,30 @@ These can be passed by setting `--authentication-pass-on-groups` and `--authenti
5050
By default, kcp-front-proxy is configured to drop `system:masters` and `system:kcp:logical-cluster-admin`.
5151
This ensures that highly privileged users do not receive elevated access when passing through the proxy.
5252

53-
## KCP Server Admin Authentication
53+
## kcp Server Admin Authentication
5454

5555
Admin Authenticator sets up user roles and groups and generates authentication tokens and `admin.kubeconfig` file. The authentication process relies on Kubernetes authenticated group authenticator.
5656
To enable admin authentication in the kcp server, you need run it in the development mode with the `--batteries-included=admin` flag set.
5757
This setting is currently enabled by default when running the `kcp` binary, but is disabled in the Helm chart.
5858

5959
### Users and Groups
6060

61-
| **User Name** | **Role** | **Groups** |
62-
|-----------------|------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------|
63-
| **shard-admin** | Member of the privileged system group. This user bypasses most kcp authorization checks. | system:masters|
64-
| **kcp-admin** | Member of the system:kcp:admin group. This user is subject to kcp authorization checks. | system:kcp:admin |
65-
| **user** | Regular non-admin user who is not a part of any predefined groups. | None |
61+
| **User Name** | **Role** | **Groups** |
62+
|-----------------|------------------------------------------------------------------------------------------|-------------------|
63+
| **shard-admin** | Member of the privileged system group. This user bypasses most kcp authorization checks. | system:masters |
64+
| **kcp-admin** | Member of the system:kcp:admin group. This user is subject to kcp authorization checks. | system:kcp:admin |
65+
| **user** | Regular non-admin user who is not a part of any predefined groups. | None |
6666

6767
### Generated Kubeconfig Contexts
6868

6969
kcp server generates a kubeconfig file (admin.kubeconfig) containing credentials for the predefined users. This file allows users to authenticate into different logical clusters.
7070

71-
| **Context Name** | **Cluster Endpoint** |
72-
|------------------|----------------------|
73-
| **root** | /clusters/root |
74-
| **base** | /clusters/base |
71+
| **Context Name** | **Cluster Endpoint** |
72+
|------------------|------------------------|
73+
| **root** | /clusters/root |
74+
| **base** | /clusters/base |
7575
| **system:admin** | /clusters/system:admin |
76-
| **shard-base** | /clusters/base |
76+
| **shard-base** | /clusters/base |
7777

7878
## Pages
7979

docs/content/concepts/authorization/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: >
55

66
# Authorization
77

8-
Within workspaces, KCP implements the same RBAC-based authorization mechanism as Kubernetes.
8+
Within workspaces, kcp implements the same RBAC-based authorization mechanism as Kubernetes.
99
Other authorization schemes (i.e. ABAC) are not supported.
1010
Generally, the same (cluster) role and (cluster) role binding principles apply exactly as in Kubernetes.
1111

0 commit comments

Comments
 (0)