Skip to content

Commit 60dccb9

Browse files
bergerhofferk8s-publishing-bot
authored andcommitted
A few minor help text tweaks
Kubernetes-commit: 5252f79f9bd1142bf838aeaf8168ca7fe7616445
1 parent 072e998 commit 60dccb9

File tree

5 files changed

+10
-11
lines changed

5 files changed

+10
-11
lines changed

pkg/cmd/auth/cani.go

+2-3
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,8 @@ var (
8383
# Check to see if I can list deployments in my current namespace
8484
kubectl auth can-i list deployments.apps
8585
86-
# Check to see if service account "foo" of namespace "dev" can list pods
87-
# in the namespace "prod".
88-
# You must be allowed to use impersonation for the global option "--as".
86+
# Check to see if service account "foo" of namespace "dev" can list pods in the namespace "prod"
87+
# You must be allowed to use impersonation for the global option "--as"
8988
kubectl auth can-i list pods --as=system:serviceaccount:dev:foo -n prod
9089
9190
# Check to see if I can do everything in my current namespace ("*" means all)

pkg/cmd/auth/whoami.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -122,16 +122,16 @@ var (
122122
whoAmILong = templates.LongDesc(`
123123
Experimental: Check who you are and your attributes (groups, extra).
124124
125-
This command is helpful to get yourself aware of the current user attributes,
126-
especially when dynamic authentication, e.g., token webhook, auth proxy, or OIDC provider,
125+
This command is helpful to get yourself aware of the current user attributes,
126+
especially when dynamic authentication, e.g., token webhook, auth proxy, or OIDC provider,
127127
is enabled in the Kubernetes cluster.
128128
`)
129129

130130
whoAmIExample = templates.Examples(`
131-
# Get your subject attributes.
131+
# Get your subject attributes
132132
kubectl auth whoami
133-
134-
# Get your subject attributes in JSON format.
133+
134+
# Get your subject attributes in JSON format
135135
kubectl auth whoami -o json
136136
`)
137137
)

pkg/cmd/create/create_rolebinding.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ var (
4444
# Create a role binding for user1, user2, and group1 using the admin cluster role
4545
kubectl create rolebinding admin --clusterrole=admin --user=user1 --user=user2 --group=group1
4646
47-
# Create a role binding for serviceaccount monitoring:sa-dev using the admin role
47+
# Create a role binding for service account monitoring:sa-dev using the admin role
4848
kubectl create rolebinding admin-binding --role=admin --serviceaccount=monitoring:sa-dev`))
4949
)
5050

pkg/cmd/rollout/rollout_restart.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ var (
6363
Resource rollout will be restarted.`))
6464

6565
restartExample = templates.Examples(`
66-
# Restart all deployments in test-namespace namespace
66+
# Restart all deployments in the test-namespace namespace
6767
kubectl rollout restart deployment -n test-namespace
6868
6969
# Restart a deployment

pkg/cmd/wait/wait.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ var (
7070
# Wait for pod "busybox1" to be Ready
7171
kubectl wait --for='jsonpath={.status.conditions[?(@.type=="Ready")].status}=True' pod/busybox1
7272
73-
# Wait for the service "loadbalancer" to have ingress.
73+
# Wait for the service "loadbalancer" to have ingress
7474
kubectl wait --for=jsonpath='{.status.loadBalancer.ingress}' service/loadbalancer
7575
7676
# Wait for the pod "busybox1" to be deleted, with a timeout of 60s, after having issued the "delete" command

0 commit comments

Comments
 (0)