diff --git a/pkg/cmd/auth/cani.go b/pkg/cmd/auth/cani.go index c211e9bba..473f8bb0f 100644 --- a/pkg/cmd/auth/cani.go +++ b/pkg/cmd/auth/cani.go @@ -83,9 +83,8 @@ var ( # Check to see if I can list deployments in my current namespace kubectl auth can-i list deployments.apps - # Check to see if service account "foo" of namespace "dev" can list pods - # in the namespace "prod". - # You must be allowed to use impersonation for the global option "--as". + # Check to see if service account "foo" of namespace "dev" can list pods in the namespace "prod" + # You must be allowed to use impersonation for the global option "--as" kubectl auth can-i list pods --as=system:serviceaccount:dev:foo -n prod # Check to see if I can do everything in my current namespace ("*" means all) diff --git a/pkg/cmd/auth/whoami.go b/pkg/cmd/auth/whoami.go index 55e4a5c62..2ecc036fb 100644 --- a/pkg/cmd/auth/whoami.go +++ b/pkg/cmd/auth/whoami.go @@ -122,16 +122,16 @@ var ( whoAmILong = templates.LongDesc(` Experimental: Check who you are and your attributes (groups, extra). - This command is helpful to get yourself aware of the current user attributes, - especially when dynamic authentication, e.g., token webhook, auth proxy, or OIDC provider, + This command is helpful to get yourself aware of the current user attributes, + especially when dynamic authentication, e.g., token webhook, auth proxy, or OIDC provider, is enabled in the Kubernetes cluster. `) whoAmIExample = templates.Examples(` - # Get your subject attributes. + # Get your subject attributes kubectl auth whoami - - # Get your subject attributes in JSON format. + + # Get your subject attributes in JSON format kubectl auth whoami -o json `) ) diff --git a/pkg/cmd/create/create_rolebinding.go b/pkg/cmd/create/create_rolebinding.go index 237a54422..d6485ce07 100644 --- a/pkg/cmd/create/create_rolebinding.go +++ b/pkg/cmd/create/create_rolebinding.go @@ -44,7 +44,7 @@ var ( # Create a role binding for user1, user2, and group1 using the admin cluster role kubectl create rolebinding admin --clusterrole=admin --user=user1 --user=user2 --group=group1 - # Create a role binding for serviceaccount monitoring:sa-dev using the admin role + # Create a role binding for service account monitoring:sa-dev using the admin role kubectl create rolebinding admin-binding --role=admin --serviceaccount=monitoring:sa-dev`)) ) diff --git a/pkg/cmd/rollout/rollout_restart.go b/pkg/cmd/rollout/rollout_restart.go index 89f7d7bcd..6b03fd7bb 100644 --- a/pkg/cmd/rollout/rollout_restart.go +++ b/pkg/cmd/rollout/rollout_restart.go @@ -63,7 +63,7 @@ var ( Resource rollout will be restarted.`)) restartExample = templates.Examples(` - # Restart all deployments in test-namespace namespace + # Restart all deployments in the test-namespace namespace kubectl rollout restart deployment -n test-namespace # Restart a deployment diff --git a/pkg/cmd/wait/wait.go b/pkg/cmd/wait/wait.go index 9097ea12c..efbe2957e 100644 --- a/pkg/cmd/wait/wait.go +++ b/pkg/cmd/wait/wait.go @@ -70,7 +70,7 @@ var ( # Wait for pod "busybox1" to be Ready kubectl wait --for='jsonpath={.status.conditions[?(@.type=="Ready")].status}=True' pod/busybox1 - # Wait for the service "loadbalancer" to have ingress. + # Wait for the service "loadbalancer" to have ingress kubectl wait --for=jsonpath='{.status.loadBalancer.ingress}' service/loadbalancer # Wait for the pod "busybox1" to be deleted, with a timeout of 60s, after having issued the "delete" command