Skip to content

Commit 9401ab7

Browse files
authored
Merge pull request #36160 from windsonsea/gracheck
Fix typos on /access-authn-authz
2 parents 81300bc + 61a5b7b commit 9401ab7

File tree

2 files changed

+4
-5
lines changed

2 files changed

+4
-5
lines changed

content/en/docs/reference/access-authn-authz/abac.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ weight: 80
1212
<!-- overview -->
1313
Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
1414

15-
1615
<!-- body -->
1716
## Policy File Format
1817

@@ -82,7 +81,7 @@ resource, and nonResourcePath properties set to `"*"`.
8281

8382
## Kubectl
8483

85-
Kubectl uses the `/api` and `/apis` endpoints of api-server to discover
84+
Kubectl uses the `/api` and `/apis` endpoints of apiserver to discover
8685
served resource types, and validates objects sent to the API by create/update
8786
operations using schema information located at `/openapi/v2`.
8887

@@ -131,7 +130,7 @@ up the verbosity:
131130

132131
## A quick note on service accounts
133132

134-
Every service account has a corresponding ABAC username, and that service account's user name is generated according to the naming convention:
133+
Every service account has a corresponding ABAC username, and that service account's username is generated according to the naming convention:
135134

136135
```shell
137136
system:serviceaccount:<namespace>:<serviceaccountname>
@@ -150,7 +149,7 @@ privilege to the API using ABAC, you would add this line to your policy file:
150149
{"apiVersion":"abac.authorization.kubernetes.io/v1beta1","kind":"Policy","spec":{"user":"system:serviceaccount:kube-system:default","namespace":"*","resource":"*","apiGroup":"*"}}
151150
```
152151

153-
The apiserver will need to be restarted to pickup the new policy lines.
152+
The apiserver will need to be restarted to pick up the new policy lines.
154153

155154

156155

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ name as the key. This admission controller, if enabled, automatically
258258
adds tolerations for such taints to pods requesting extended resources, so users don't have to manually
259259
add these tolerations.
260260
261-
This admission controller is diabled by default.
261+
This admission controller is disabled by default.
262262
263263
### ImagePolicyWebhook {#imagepolicywebhook}
264264

0 commit comments

Comments
 (0)