Skip to content

Commit 0ef8683

Browse files
change from K8s to k8s (IBM#260)
* change from K8s to k8s * fix tested cluster version
1 parent b615569 commit 0ef8683

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

docs/README_OPERATOR_HUB.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
# K8s Integrity Shield
2-
K8s Integrity Shield is a tool for built-in preventive integrity control for regulated cloud workloads. It includes signature based configuration drift prevention based on Admission Webhook on Kubernetes cluster.
1+
# k8s Integrity Shield
2+
k8s Integrity Shield is a tool for built-in preventive integrity control for regulated cloud workloads. It includes signature based configuration drift prevention based on Admission Webhook on Kubernetes cluster.
33

4-
K8s Integrity Shield's capabilities are
4+
k8s Integrity Shield's capabilities are
55

66
- Allow to deploy authorized application pakcages only
77
- Allow to use signed deployment params only
@@ -129,10 +129,10 @@ configmap/test-cm created
129129

130130
## Supported Platforms
131131

132-
K8s Integrity Shield works as Kubernetes Admission Controller using Mutating Admission Webhook, and it can run on any Kubernetes cluster by design.
132+
k8s Integrity Shield works as Kubernetes Admission Controller using Mutating Admission Webhook, and it can run on any Kubernetes cluster by design.
133133
We have verified the feasibility on the following platforms:
134134

135135
- [RedHat OpenShift 4.5 and 4.6](https://www.openshift.com/)
136-
- [RedHat OpenShift 4.3 on IBM Cloud (ROKS)](https://www.openshift.com/products/openshift-ibm-cloud)
136+
- [RedHat OpenShift 4.5 on IBM Cloud (ROKS)](https://www.openshift.com/products/openshift-ibm-cloud)
137137
- [IBM Kuberenetes Service (IKS)](https://www.ibm.com/cloud/container-service/) 1.17.14
138138
- [Minikube v1.19.1](https://kubernetes.io/docs/setup/learning-environment/minikube/)

shield/pkg/util/kubeutil/dryrun.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ var (
4747
func DryRunCreate(objBytes []byte, namespace string) ([]byte, error) {
4848
config, err := GetKubeConfig()
4949
if err != nil {
50-
return nil, fmt.Errorf("Error in getting K8s config; %s", err.Error())
50+
return nil, fmt.Errorf("Error in getting k8s config; %s", err.Error())
5151
}
5252
dyClient, err := dynamic.NewForConfig(config)
5353
if err != nil {
@@ -88,7 +88,7 @@ func DryRunCreate(objBytes []byte, namespace string) ([]byte, error) {
8888
func StrategicMergePatch(objBytes, patchBytes []byte, namespace string) ([]byte, error) {
8989
config, err := GetKubeConfig()
9090
if err != nil {
91-
return nil, fmt.Errorf("Error in getting K8s config; %s", err.Error())
91+
return nil, fmt.Errorf("Error in getting k8s config; %s", err.Error())
9292
}
9393
dyClient, err := dynamic.NewForConfig(config)
9494
if err != nil {
@@ -144,7 +144,7 @@ func StrategicMergePatch(objBytes, patchBytes []byte, namespace string) ([]byte,
144144
func GetApplyPatchBytes(objBytes []byte, namespace string) ([]byte, []byte, error) {
145145
config, err := GetKubeConfig()
146146
if err != nil {
147-
return nil, nil, fmt.Errorf("Error in getting K8s config; %s", err.Error())
147+
return nil, nil, fmt.Errorf("Error in getting k8s config; %s", err.Error())
148148
}
149149
dyClient, err := dynamic.NewForConfig(config)
150150
if err != nil {

0 commit comments

Comments
 (0)