This is an automated email from the ASF dual-hosted git repository.

zhongxjian pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/dubbo-kubernetes.git


The following commit(s) were added to refs/heads/master by this push:
     new aedfc0d3 Rename planet to dubbo (#854)
aedfc0d3 is described below

commit aedfc0d3caa03c1dfae42e5ef370ee6b67c9a129
Author: mfordjody <[email protected]>
AuthorDate: Sun Jan 25 01:18:16 2026 +0800

    Rename planet to dubbo (#854)
---
 .github/ISSUE_TEMPLATE/feature-request.md          |  5 +--
 .github/PULL_REQUEST_TEMPLATE.md                   |  3 +-
 api/kubernetes/customresourcedefinitions.gen.yaml  |  6 +--
 api/networking/v1alpha3/destination_rule.pb.go     |  2 +-
 api/networking/v1alpha3/destination_rule.proto     |  2 +-
 api/networking/v1alpha3/virtual_service.pb.go      |  2 +-
 api/networking/v1alpha3/virtual_service.proto      |  2 +-
 api/security/v1alpha3/peer_authentication.pb.go    |  2 +-
 api/security/v1alpha3/peer_authentication.proto    |  2 +-
 .../pkg/apis/networking/v1alpha3/types.gen.go      |  4 +-
 client-go/pkg/apis/security/v1alpha3/types.gen.go  |  2 +-
 dubbod/discovery/cmd/dubbo-agent/app/cmd.go        |  6 +--
 dubbod/discovery/cmd/dubbo-agent/config/config.go  |  2 +-
 .../cmd/dubbo-agent/options/agent_proxy.go         |  4 +-
 .../discovery/cmd/dubbo-agent/options/security.go  |  2 +-
 dubbod/discovery/cmd/dubbo-discover/app/cmd.go     |  2 +-
 dubbod/discovery/docker/dockerfile.planet          |  4 +-
 dubbod/discovery/docker/dockerfile.proxyadapter    |  4 +-
 dubbod/discovery/pkg/bootstrap/cert_controller.go  |  4 +-
 .../discovery/pkg/bootstrap/config_controller.go   | 10 ++---
 dubbod/discovery/pkg/bootstrap/options.go          |  2 +-
 dubbod/discovery/pkg/bootstrap/server.go           | 48 +++++++++++-----------
 dubbod/discovery/pkg/bootstrap/validation.go       |  2 +-
 dubbod/discovery/pkg/config/kube/crd/conversion.go |  2 +-
 .../discovery/pkg/config/kube/crdclient/client.go  |  8 ++--
 .../discovery/pkg/config/kube/crdclient/types.go   |  8 ++--
 .../discovery/pkg/config/kube/file/controller.go   |  2 +-
 dubbod/discovery/pkg/features/experimental.go      | 10 ++---
 dubbod/discovery/pkg/features/planet.go            | 12 +++---
 dubbod/discovery/pkg/features/security.go          |  4 +-
 dubbod/discovery/pkg/features/tuning.go            | 20 ++++-----
 dubbod/discovery/pkg/features/xds.go               | 12 +++---
 .../kube/controller/multicluster.go                |  4 +-
 dubbod/discovery/pkg/xds/discovery.go              |  1 -
 go.sum                                             | 24 +++++++++++
 manifests/charts/base/files/crd-all.gen.yaml       |  6 +--
 .../dubbo-discovery/files/gateway.yaml             |  2 +-
 .../dubbo-discovery/files/grpc-agent.yaml          |  4 +-
 .../dubbo-discovery/templates/deployment.yaml      |  2 +-
 .../dubbo-control/dubbo-discovery/values.yaml      |  2 +-
 manifests/profiles/default.yaml                    |  2 +-
 operator/pkg/apis/types.go                         |  6 +--
 operator/pkg/component/component.go                | 13 +++---
 operator/pkg/install/installer.go                  |  4 +-
 operator/pkg/uninstall/prune.go                    |  2 +-
 pkg/adsc/adsc.go                                   |  4 +-
 pkg/bootstrap/config.go                            |  4 +-
 pkg/config/constants/constants.go                  | 18 ++++----
 pkg/config/schema/collections/collections.agent.go | 12 +++---
 pkg/config/schema/collections/collections.go       | 12 +++---
 pkg/config/schema/collections/gateway.go           |  4 +-
 pkg/dubboagent/agent.go                            | 14 +++----
 pkg/dubboagent/grpcxds/grpc_bootstrap.go           |  2 +-
 pkg/dubboagent/xds_proxy.go                        |  2 +-
 pkg/dubboagent/xds_proxy_delta.go                  |  2 +-
 pkg/model/proxy.go                                 | 16 ++++----
 pkg/security/security.go                           |  2 +-
 tools/build-tools/docker/Dockerfile                |  4 +-
 58 files changed, 193 insertions(+), 175 deletions(-)

diff --git a/.github/ISSUE_TEMPLATE/feature-request.md 
b/.github/ISSUE_TEMPLATE/feature-request.md
index ada6aa57..b54975de 100644
--- a/.github/ISSUE_TEMPLATE/feature-request.md
+++ b/.github/ISSUE_TEMPLATE/feature-request.md
@@ -26,12 +26,9 @@ assignees: ''
 
 <!-- Please put an X in all that apply -->
 
-- [ ] Core Components
-- [ ] Control Plane (Planet Discovery)
-- [ ] Data Plane (Planet Agent)
+- [ ] Control Plane
 - [ ] Operator
 - [ ] Helm Charts
-- [ ] Documentation
 - [ ] Installation
 - [ ] Testing
 - [ ] User Experience
diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md
index 8bddf5e9..a308c557 100644
--- a/.github/PULL_REQUEST_TEMPLATE.md
+++ b/.github/PULL_REQUEST_TEMPLATE.md
@@ -28,8 +28,7 @@ Related to #
 <!-- Please put an X in all that apply -->
 
 - [ ] Core Components
-- [ ] Control Plane (Planet Discovery)
-- [ ] Data Plane (Planet Agent)
+- [ ] Control Plane
 - [ ] Operator
 - [ ] Helm Charts
 - [ ] Documentation
diff --git a/api/kubernetes/customresourcedefinitions.gen.yaml 
b/api/kubernetes/customresourcedefinitions.gen.yaml
index 0c6c1dea..04730e6f 100644
--- a/api/kubernetes/customresourcedefinitions.gen.yaml
+++ b/api/kubernetes/customresourcedefinitions.gen.yaml
@@ -5,7 +5,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     heritage: Tiller
     release: dubbo
@@ -139,7 +139,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     heritage: Tiller
     release: dubbo
@@ -258,7 +258,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     dubbo: security
     heritage: Tiller
diff --git a/api/networking/v1alpha3/destination_rule.pb.go 
b/api/networking/v1alpha3/destination_rule.pb.go
index b62f2a07..ffb639f3 100644
--- a/api/networking/v1alpha3/destination_rule.pb.go
+++ b/api/networking/v1alpha3/destination_rule.pb.go
@@ -100,7 +100,7 @@ func (ClientTLSSettings_TLSmode) EnumDescriptor() ([]byte, 
[]int) {
 // +cue-gen:DestinationRule:groupName:networking.dubbo.apache.org
 // +cue-gen:DestinationRule:versions:v1alpha3
 // +cue-gen:DestinationRule:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:DestinationRule:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:DestinationRule:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:DestinationRule:subresource:status
 // +cue-gen:DestinationRule:scope:Namespaced
 // +cue-gen:DestinationRule:resource:categories=dubbo,networking,shortNames=dr
diff --git a/api/networking/v1alpha3/destination_rule.proto 
b/api/networking/v1alpha3/destination_rule.proto
index 64b62207..2222e89f 100644
--- a/api/networking/v1alpha3/destination_rule.proto
+++ b/api/networking/v1alpha3/destination_rule.proto
@@ -36,7 +36,7 @@ option go_package = "/api/networking/v1alpha3";
 // +cue-gen:DestinationRule:groupName:networking.dubbo.apache.org
 // +cue-gen:DestinationRule:versions:v1alpha3
 // +cue-gen:DestinationRule:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:DestinationRule:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:DestinationRule:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:DestinationRule:subresource:status
 // +cue-gen:DestinationRule:scope:Namespaced
 // +cue-gen:DestinationRule:resource:categories=dubbo,networking,shortNames=dr
diff --git a/api/networking/v1alpha3/virtual_service.pb.go 
b/api/networking/v1alpha3/virtual_service.pb.go
index c68f5aa5..d96b93e0 100644
--- a/api/networking/v1alpha3/virtual_service.pb.go
+++ b/api/networking/v1alpha3/virtual_service.pb.go
@@ -49,7 +49,7 @@ const (
 // +cue-gen:VirtualService:groupName:networking.dubbo.apache.org
 // +cue-gen:VirtualService:versions:v1alpha3
 // +cue-gen:VirtualService:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:VirtualService:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:VirtualService:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:VirtualService:subresource:status
 // +cue-gen:VirtualService:scope:Namespaced
 // +cue-gen:VirtualService:resource:categories=dubbo,networking,shortNames=vs
diff --git a/api/networking/v1alpha3/virtual_service.proto 
b/api/networking/v1alpha3/virtual_service.proto
index ef56c119..d50e10ae 100644
--- a/api/networking/v1alpha3/virtual_service.proto
+++ b/api/networking/v1alpha3/virtual_service.proto
@@ -34,7 +34,7 @@ option go_package = "/api/networking/v1alpha3";
 // +cue-gen:VirtualService:groupName:networking.dubbo.apache.org
 // +cue-gen:VirtualService:versions:v1alpha3
 // +cue-gen:VirtualService:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:VirtualService:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:VirtualService:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:VirtualService:subresource:status
 // +cue-gen:VirtualService:scope:Namespaced
 // +cue-gen:VirtualService:resource:categories=dubbo,networking,shortNames=vs
diff --git a/api/security/v1alpha3/peer_authentication.pb.go 
b/api/security/v1alpha3/peer_authentication.pb.go
index 1e8137d7..e6b1c763 100644
--- a/api/security/v1alpha3/peer_authentication.pb.go
+++ b/api/security/v1alpha3/peer_authentication.pb.go
@@ -99,7 +99,7 @@ func (PeerAuthentication_MutualTLS_Mode) EnumDescriptor() 
([]byte, []int) {
 // +cue-gen:PeerAuthentication:versions:v1alpha3
 // +cue-gen:PeerAuthentication:storageVersion
 // +cue-gen:PeerAuthentication:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:PeerAuthentication:labels:app=dubbo-planet,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
+// 
+cue-gen:PeerAuthentication:labels:app=dubbo,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
 // +cue-gen:PeerAuthentication:subresource:status
 // +cue-gen:PeerAuthentication:scope:Namespaced
 // +cue-gen:PeerAuthentication:resource:categories=dubbo,security,shortNames=pa
diff --git a/api/security/v1alpha3/peer_authentication.proto 
b/api/security/v1alpha3/peer_authentication.proto
index adf33baa..fc99d3f4 100644
--- a/api/security/v1alpha3/peer_authentication.proto
+++ b/api/security/v1alpha3/peer_authentication.proto
@@ -33,7 +33,7 @@ option go_package = "/api/security/v1alpha3";
 // +cue-gen:PeerAuthentication:versions:v1alpha3
 // +cue-gen:PeerAuthentication:storageVersion
 // +cue-gen:PeerAuthentication:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:PeerAuthentication:labels:app=dubbo-planet,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
+// 
+cue-gen:PeerAuthentication:labels:app=dubbo,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
 // +cue-gen:PeerAuthentication:subresource:status
 // +cue-gen:PeerAuthentication:scope:Namespaced
 // +cue-gen:PeerAuthentication:resource:categories=dubbo,security,shortNames=pa
diff --git a/client-go/pkg/apis/networking/v1alpha3/types.gen.go 
b/client-go/pkg/apis/networking/v1alpha3/types.gen.go
index 6eeaad5c..173f57cb 100644
--- a/client-go/pkg/apis/networking/v1alpha3/types.gen.go
+++ b/client-go/pkg/apis/networking/v1alpha3/types.gen.go
@@ -34,7 +34,7 @@ import (
 // +cue-gen:DestinationRule:groupName:networking.dubbo.apache.org
 // +cue-gen:DestinationRule:versions:v1alpha3
 // +cue-gen:DestinationRule:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:DestinationRule:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:DestinationRule:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:DestinationRule:subresource:status
 // +cue-gen:DestinationRule:scope:Namespaced
 // +cue-gen:DestinationRule:resource:categories=dubbo,networking,shortNames=dr
@@ -86,7 +86,7 @@ type DestinationRuleList struct {
 // +cue-gen:VirtualService:groupName:networking.dubbo.apache.org
 // +cue-gen:VirtualService:versions:v1alpha3
 // +cue-gen:VirtualService:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:VirtualService:labels:app=dubbo-planet,chart=dubbo,heritage=Tiller,release=dubbo
+// 
+cue-gen:VirtualService:labels:app=dubbo,chart=dubbo,heritage=Tiller,release=dubbo
 // +cue-gen:VirtualService:subresource:status
 // +cue-gen:VirtualService:scope:Namespaced
 // +cue-gen:VirtualService:resource:categories=dubbo,networking,shortNames=vs
diff --git a/client-go/pkg/apis/security/v1alpha3/types.gen.go 
b/client-go/pkg/apis/security/v1alpha3/types.gen.go
index 9a51eaa3..a188d876 100644
--- a/client-go/pkg/apis/security/v1alpha3/types.gen.go
+++ b/client-go/pkg/apis/security/v1alpha3/types.gen.go
@@ -32,7 +32,7 @@ import (
 // +cue-gen:PeerAuthentication:versions:v1alpha3
 // +cue-gen:PeerAuthentication:storageVersion
 // +cue-gen:PeerAuthentication:annotations:helm.sh/resource-policy=keep
-// 
+cue-gen:PeerAuthentication:labels:app=dubbo-planet,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
+// 
+cue-gen:PeerAuthentication:labels:app=dubbo,chart=dubbo,dubbo=security,heritage=Tiller,release=dubbo
 // +cue-gen:PeerAuthentication:subresource:status
 // +cue-gen:PeerAuthentication:scope:Namespaced
 // +cue-gen:PeerAuthentication:resource:categories=dubbo,security,shortNames=pa
diff --git a/dubbod/discovery/cmd/dubbo-agent/app/cmd.go 
b/dubbod/discovery/cmd/dubbo-agent/app/cmd.go
index 62cce8b0..61c328dd 100644
--- a/dubbod/discovery/cmd/dubbo-agent/app/cmd.go
+++ b/dubbod/discovery/cmd/dubbo-agent/app/cmd.go
@@ -46,9 +46,9 @@ var (
 
 func NewRootCommand(sds dubboagent.SDSServiceFactory) *cobra.Command {
        rootCmd := &cobra.Command{
-               Use:          "planet-agent",
-               Short:        "Dubbo Planet agent.",
-               Long:         "Dubbo Planet agent bootstraps via gRPC xDS.",
+               Use:          "dubbo-agent",
+               Short:        "Dubbo agent.",
+               Long:         "Dubbo agent bootstraps via gRPC xDS.",
                SilenceUsage: true,
                FParseErrWhitelist: cobra.FParseErrWhitelist{
                        UnknownFlags: true,
diff --git a/dubbod/discovery/cmd/dubbo-agent/config/config.go 
b/dubbod/discovery/cmd/dubbo-agent/config/config.go
index e1807587..2c38adda 100644
--- a/dubbod/discovery/cmd/dubbo-agent/config/config.go
+++ b/dubbod/discovery/cmd/dubbo-agent/config/config.go
@@ -18,7 +18,7 @@ package config
 
 import "strings"
 
-func GetPlanetSan(discoveryAddress string) string {
+func GetDubboSan(discoveryAddress string) string {
        discHost := strings.Split(discoveryAddress, ":")[0]
        // For local debugging - the discoveryAddress is set to localhost, but 
the cert issued for normal PA.
        if discHost == "localhost" {
diff --git a/dubbod/discovery/cmd/dubbo-agent/options/agent_proxy.go 
b/dubbod/discovery/cmd/dubbo-agent/options/agent_proxy.go
index 5b6025f5..28c99e37 100644
--- a/dubbod/discovery/cmd/dubbo-agent/options/agent_proxy.go
+++ b/dubbod/discovery/cmd/dubbo-agent/options/agent_proxy.go
@@ -16,11 +16,11 @@
 
 package options
 
-import planetagent "github.com/apache/dubbo-kubernetes/pkg/dubboagent"
+import "github.com/apache/dubbo-kubernetes/pkg/dubboagent"
 
 // ProxyArgs provides all of the configuration parameters for the Saku proxy.
 type ProxyArgs struct {
-       planetagent.Proxy
+       dubboagent.Proxy
        Concurrency int
        StsPort     int
 
diff --git a/dubbod/discovery/cmd/dubbo-agent/options/security.go 
b/dubbod/discovery/cmd/dubbo-agent/options/security.go
index e275c38b..514b7b02 100644
--- a/dubbod/discovery/cmd/dubbo-agent/options/security.go
+++ b/dubbod/discovery/cmd/dubbo-agent/options/security.go
@@ -39,7 +39,7 @@ func NewSecurityOptions(proxyConfig 
*serviceRouteIndex.ProxyConfig, stsPort int,
        o := &security.Options{
                CAEndpoint:           caEndpointEnv,
                CAProviderName:       caProviderEnv,
-               PlanetCertProvider:   features.PlanetCertProvider,
+               DubboCertProvider:    features.DubboCertProvider,
                OutputKeyCertToDir:   outputKeyCertToDir,
                ProvCert:             provCert,
                ClusterID:            clusterIDVar.Get(),
diff --git a/dubbod/discovery/cmd/dubbo-discover/app/cmd.go 
b/dubbod/discovery/cmd/dubbo-discover/app/cmd.go
index 51f7e16b..c882f9b1 100644
--- a/dubbod/discovery/cmd/dubbo-discover/app/cmd.go
+++ b/dubbod/discovery/cmd/dubbo-discover/app/cmd.go
@@ -89,7 +89,7 @@ func newDiscoveryCommand() *cobra.Command {
 }
 
 func addFlags(c *cobra.Command) {
-       serverArgs = bootstrap.NewPlanetArgs(func(p *bootstrap.DubboArgs) {
+       serverArgs = bootstrap.NewDubboArgs(func(p *bootstrap.DubboArgs) {
                p.CtrlZOptions = ctrlz.DefaultOptions()
                p.InjectionOptions = bootstrap.InjectionOptions{
                        InjectionDirectory: "./var/lib/dubbo/inject",
diff --git a/dubbod/discovery/docker/dockerfile.planet 
b/dubbod/discovery/docker/dockerfile.planet
index fe9e7904..de35f0f8 100644
--- a/dubbod/discovery/docker/dockerfile.planet
+++ b/dubbod/discovery/docker/dockerfile.planet
@@ -14,6 +14,6 @@
 # limitations under the License.
 
 FROM gcr.io/distroless/static:debug
-COPY bin/planet-discovery /usr/local/bin/planet-discovery
+COPY bin/dubbo-discovery /usr/local/bin/dubbo-discovery
 USER 9999:9999
-ENTRYPOINT ["/usr/local/bin/planet-discovery"]
+ENTRYPOINT ["/usr/local/bin/dubbo-discovery"]
diff --git a/dubbod/discovery/docker/dockerfile.proxyadapter 
b/dubbod/discovery/docker/dockerfile.proxyadapter
index d89f531a..5cde2f66 100644
--- a/dubbod/discovery/docker/dockerfile.proxyadapter
+++ b/dubbod/discovery/docker/dockerfile.proxyadapter
@@ -14,7 +14,7 @@
 # limitations under the License.
 
 FROM gcr.io/distroless/static:debug
-COPY bin/planet-agent /usr/local/bin/planet-agent
+COPY bin/dubbo-agent /usr/local/bin/dubbo-agent
 COPY bin/pixiugateway /usr/local/bin/pixiugateway
 USER 9999:9999
-ENTRYPOINT ["/usr/local/bin/planet-agent"]
+ENTRYPOINT ["/usr/local/bin/dubbo-agent"]
diff --git a/dubbod/discovery/pkg/bootstrap/cert_controller.go 
b/dubbod/discovery/pkg/bootstrap/cert_controller.go
index 402e811f..efa2946b 100644
--- a/dubbod/discovery/pkg/bootstrap/cert_controller.go
+++ b/dubbod/discovery/pkg/bootstrap/cert_controller.go
@@ -102,9 +102,9 @@ func (s *Server) RotateDNSCertForK8sCA(stop <-chan 
struct{}, defaultCACertPath s
 func (s *Server) initDNSCertsK8SRA() error {
        var certChain, keyPEM, caBundle []byte
        var err error
-       planetCertProviderName := features.PlanetCertProvider
+       dubboCertProviderName := features.DubboCertProvider
 
-       signerName := strings.TrimPrefix(planetCertProviderName, 
constants.CertProviderKubernetesSignerPrefix)
+       signerName := strings.TrimPrefix(dubboCertProviderName, 
constants.CertProviderKubernetesSignerPrefix)
        log.Infof("Generating K8S-signed cert for %v using signer %v", 
s.dnsNames, signerName)
        certChain, keyPEM, _, err = chiron.GenKeyCertK8sCA(s.kubeClient.Kube(),
                strings.Join(s.dnsNames, ","), "", signerName, true, 
SelfSignedCACertTTL.Get())
diff --git a/dubbod/discovery/pkg/bootstrap/config_controller.go 
b/dubbod/discovery/pkg/bootstrap/config_controller.go
index 56a67c01..a268b69f 100644
--- a/dubbod/discovery/pkg/bootstrap/config_controller.go
+++ b/dubbod/discovery/pkg/bootstrap/config_controller.go
@@ -57,9 +57,9 @@ func (s *Server) makeKubeConfigController(args *DubboArgs) 
*crdclient.Client {
                KrtDebugger:  args.KrtDebugger,
        }
 
-       schemas := collections.Planet
+       schemas := collections.Dubbo
        if features.EnableGatewayAPI {
-               schemas = collections.PlanetGatewayAPI()
+               schemas = collections.DubboGatewayAPI()
        }
        return crdclient.NewForSchemas(s.kubeClient, opts, schemas)
 }
@@ -162,7 +162,7 @@ func (s *Server) initConfigSources(args *DubboArgs) (err 
error) {
                        configController, err := file.NewController(
                                srcAddress.Path,
                                args.RegistryOptions.KubeOptions.DomainSuffix,
-                               collections.Planet,
+                               collections.Dubbo,
                                args.RegistryOptions.KubeOptions,
                        )
                        if err != nil {
@@ -190,7 +190,7 @@ func (s *Server) initConfigSources(args *DubboArgs) (err 
error) {
                        if err != nil {
                                return fmt.Errorf("failed to dial XDS %s %v", 
configSource.Address, err)
                        }
-                       store := memory.Make(collections.Planet)
+                       store := memory.Make(collections.Dubbo)
                        configController := memory.NewController(store)
                        
configController.RegisterHasSyncedHandler(xdsClient.HasSynced)
                        xdsClient.Store = configController
@@ -233,7 +233,7 @@ func (s *Server) initConfigController(args *DubboArgs) 
error {
                configController, err := file.NewController(
                        args.RegistryOptions.FileDir,
                        args.RegistryOptions.KubeOptions.DomainSuffix,
-                       collections.Planet,
+                       collections.Dubbo,
                        args.RegistryOptions.KubeOptions,
                )
                if err != nil {
diff --git a/dubbod/discovery/pkg/bootstrap/options.go 
b/dubbod/discovery/pkg/bootstrap/options.go
index 590a4f01..9a724db8 100644
--- a/dubbod/discovery/pkg/bootstrap/options.go
+++ b/dubbod/discovery/pkg/bootstrap/options.go
@@ -73,7 +73,7 @@ type TLSOptions struct {
        CipherSuits     []uint16 // This is the parsed cipher suites
 }
 
-func NewPlanetArgs(initFuncs ...func(*DubboArgs)) *DubboArgs {
+func NewDubboArgs(initFuncs ...func(*DubboArgs)) *DubboArgs {
        p := &DubboArgs{}
 
        // Apply Default Values.
diff --git a/dubbod/discovery/pkg/bootstrap/server.go 
b/dubbod/discovery/pkg/bootstrap/server.go
index 9fdf3cad..04c8b636 100644
--- a/dubbod/discovery/pkg/bootstrap/server.go
+++ b/dubbod/discovery/pkg/bootstrap/server.go
@@ -472,10 +472,10 @@ func (s *Server) initRegistryEventHandlers() {
 
                // Build ConfigKey for the changed config
                // Find the schema to get the kind.Kind
-               // First try Planet schemas, then try PlanetGatewayAPI schemas
-               schema, found := 
collections.Planet.FindByGroupVersionKind(cfg.GroupVersionKind)
+               // First try Dubbo schemas, then try DubboGatewayAPI schemas
+               schema, found := 
collections.Dubbo.FindByGroupVersionKind(cfg.GroupVersionKind)
                if !found && features.EnableGatewayAPI {
-                       schema, found = 
collections.PlanetGatewayAPI().FindByGroupVersionKind(cfg.GroupVersionKind)
+                       schema, found = 
collections.DubboGatewayAPI().FindByGroupVersionKind(cfg.GroupVersionKind)
                }
                if !found {
                        log.Warnf("configHandler: schema not found for %v, 
skipping", cfg.GroupVersionKind)
@@ -530,9 +530,9 @@ func (s *Server) initRegistryEventHandlers() {
                        Full:           needsFullPush, // Full push for 
DestinationRule/VirtualService to reload PushContext
                })
        }
-       schemas := collections.Planet.All()
+       schemas := collections.Dubbo.All()
        if features.EnableGatewayAPI {
-               schemas = collections.PlanetGatewayAPI().All()
+               schemas = collections.DubboGatewayAPI().All()
        }
        log.Debugf("initRegistryEventHandlers: found %d schemas to register", 
len(schemas))
        registeredCount := 0
@@ -718,8 +718,8 @@ func (s *Server) createPeerCertVerifier(tlsOptions 
TLSOptions, trustDomain strin
                }
        } else {
                if s.RA != nil {
-                       if strings.HasPrefix(features.PlanetCertProvider, 
constants.CertProviderKubernetesSignerPrefix) {
-                               signerName := 
strings.TrimPrefix(features.PlanetCertProvider, 
constants.CertProviderKubernetesSignerPrefix)
+                       if strings.HasPrefix(features.DubboCertProvider, 
constants.CertProviderKubernetesSignerPrefix) {
+                               signerName := 
strings.TrimPrefix(features.DubboCertProvider, 
constants.CertProviderKubernetesSignerPrefix)
                                caBundle, _ := 
s.RA.GetRootCertFromMeshGlobalConfig(signerName)
                                rootCertBytes = append(rootCertBytes, 
caBundle...)
                        } else {
@@ -821,7 +821,7 @@ func (s *Server) initSDSServer() {
        }
        if !features.EnableXDSIdentityCheck {
                // Make sure we have security
-               log.Warnf("skipping Kubernetes credential reader; 
PLANET_ENABLE_XDS_IDENTITY_CHECK must be set to true for this feature.")
+               log.Warnf("skipping Kubernetes credential reader; 
DUBBO_ENABLE_XDS_IDENTITY_CHECK must be set to true for this feature.")
        } else {
                // TODO ConfigUpdated Multicluster get secret and configmap
        }
@@ -829,7 +829,7 @@ func (s *Server) initSDSServer() {
 
 // isK8SSigning returns whether K8S (as a RA) is used to sign certs instead of 
private keys known by Dubbod
 func (s *Server) isK8SSigning() bool {
-       return s.RA != nil && strings.HasPrefix(features.PlanetCertProvider, 
constants.CertProviderKubernetesSignerPrefix)
+       return s.RA != nil && strings.HasPrefix(features.DubboCertProvider, 
constants.CertProviderKubernetesSignerPrefix)
 }
 
 func (s *Server) cachesSynced() bool {
@@ -941,17 +941,17 @@ func (s *Server) initDubbodCerts(args *DubboArgs, host 
string) error {
                        log.Errorf("error initializing certificate watches: 
%v", err)
                        return nil
                }
-       } else if features.EnableCAServer && features.PlanetCertProvider == 
constants.CertProviderDubbod {
+       } else if features.EnableCAServer && features.DubboCertProvider == 
constants.CertProviderDubbod {
                log.Infof("initializing Dubbod DNS certificates host: %s, 
custom host: %s", host, features.DubbodServiceCustomHost)
                err = s.initDNSCertsDubbod()
-       } else if features.PlanetCertProvider == 
constants.CertProviderKubernetes {
-               log.Warnf("PLANET_CERT_PROVIDER=kubernetes is no longer 
supported by upstream K8S")
-       } else if strings.HasPrefix(features.PlanetCertProvider, 
constants.CertProviderKubernetesSignerPrefix) {
-               log.Infof("initializing Dubbod DNS certificates using K8S RA:%s 
 host: %s, custom host: %s", features.PlanetCertProvider,
+       } else if features.DubboCertProvider == 
constants.CertProviderKubernetes {
+               log.Warnf("DUBBO_CERT_PROVIDER=kubernetes is no longer 
supported by upstream K8S")
+       } else if strings.HasPrefix(features.DubboCertProvider, 
constants.CertProviderKubernetesSignerPrefix) {
+               log.Infof("initializing Dubbod DNS certificates using K8S RA:%s 
 host: %s, custom host: %s", features.DubboCertProvider,
                        host, features.DubbodServiceCustomHost)
                err = s.initDNSCertsK8SRA()
        } else {
-               log.Warnf("PLANET_CERT_PROVIDER=%s is not implemented", 
features.PlanetCertProvider)
+               log.Warnf("DUBBO_CERT_PROVIDER=%s is not implemented", 
features.DubboCertProvider)
        }
 
        if err == nil {
@@ -982,7 +982,7 @@ func (s *Server) shouldStartNsController() bool {
        }
 
        // For no CA we don't distribute it either, as there is no cert
-       if features.PlanetCertProvider == constants.CertProviderNone {
+       if features.DubboCertProvider == constants.CertProviderNone {
                return false
        }
 
@@ -1018,17 +1018,17 @@ func hasCustomTLSCerts(tlsOptions TLSOptions) (ok bool, 
tlsCertPath, tlsKeyPath,
                return true, tlsOptions.CertFile, tlsOptions.KeyFile, 
tlsOptions.CaCertFile
        }
 
-       if ok = checkPathsExist(constants.DefaultPlanetTLSCert, 
constants.DefaultPlanetTLSKey, constants.DefaultPlanetTLSCaCert); ok {
-               tlsCertPath = constants.DefaultPlanetTLSCert
-               tlsKeyPath = constants.DefaultPlanetTLSKey
-               caCertPath = constants.DefaultPlanetTLSCaCert
+       if ok = checkPathsExist(constants.DefaultDubboTLSCert, 
constants.DefaultDubboTLSKey, constants.DefaultDubboTLSCaCert); ok {
+               tlsCertPath = constants.DefaultDubboTLSCert
+               tlsKeyPath = constants.DefaultDubboTLSKey
+               caCertPath = constants.DefaultDubboTLSCaCert
                return
        }
 
-       if ok = checkPathsExist(constants.DefaultPlanetTLSCert, 
constants.DefaultPlanetTLSKey, constants.DefaultPlanetTLSCaCertAlternatePath); 
ok {
-               tlsCertPath = constants.DefaultPlanetTLSCert
-               tlsKeyPath = constants.DefaultPlanetTLSKey
-               caCertPath = constants.DefaultPlanetTLSCaCertAlternatePath
+       if ok = checkPathsExist(constants.DefaultDubboTLSCert, 
constants.DefaultDubboTLSKey, constants.DefaultDubboTLSCaCertAlternatePath); ok 
{
+               tlsCertPath = constants.DefaultDubboTLSCert
+               tlsKeyPath = constants.DefaultDubboTLSKey
+               caCertPath = constants.DefaultDubboTLSCaCertAlternatePath
                return
        }
 
diff --git a/dubbod/discovery/pkg/bootstrap/validation.go 
b/dubbod/discovery/pkg/bootstrap/validation.go
index e73f3481..f2ff4edc 100644
--- a/dubbod/discovery/pkg/bootstrap/validation.go
+++ b/dubbod/discovery/pkg/bootstrap/validation.go
@@ -30,7 +30,7 @@ func (s *Server) initConfigValidation(args *DubboArgs) error {
        }
        log.Info("initializing config validator")
        params := server.Options{
-               Schemas:      collections.Planet,
+               Schemas:      collections.Dubbo,
                DomainSuffix: args.RegistryOptions.KubeOptions.DomainSuffix,
                Mux:          s.httpsMux,
        }
diff --git a/dubbod/discovery/pkg/config/kube/crd/conversion.go 
b/dubbod/discovery/pkg/config/kube/crd/conversion.go
index a3bd790c..6a18bb4f 100644
--- a/dubbod/discovery/pkg/config/kube/crd/conversion.go
+++ b/dubbod/discovery/pkg/config/kube/crd/conversion.go
@@ -56,7 +56,7 @@ func parseInputsImpl(inputs string, withValidate bool) 
([]config.Config, []Dubbo
                }
 
                // gvk := obj.GroupVersionKind()
-               // s, exists := 
collections.PlanetGatewayAPI().FindByGroupVersionAliasesKind(resource.FromKubernetesGVK(&gvk))
+               // s, exists := 
collections.DubboGatewayAPI().FindByGroupVersionAliasesKind(resource.FromKubernetesGVK(&gvk))
                // if !exists {
                //      log.Debugf("unrecognized type %v", obj.Kind)
                //      others = append(others, obj)
diff --git a/dubbod/discovery/pkg/config/kube/crdclient/client.go 
b/dubbod/discovery/pkg/config/kube/crdclient/client.go
index c691e8c1..89cb135e 100644
--- a/dubbod/discovery/pkg/config/kube/crdclient/client.go
+++ b/dubbod/discovery/pkg/config/kube/crdclient/client.go
@@ -88,7 +88,7 @@ func NewForSchemas(client kube.Client, opts Option, schemas 
collection.Schemas)
                client:           client,
                filtersByGVK:     opts.FiltersByGVK,
                stop:             stop,
-               logger:           log.RegisterScope("crdclient", "Planet 
Kubernetes CRD controller"),
+               logger:           log.RegisterScope("crdclient", "Dubbo 
Kubernetes CRD controller"),
        }
 
        kopts := krt.NewOptionsBuilder(stop, "crdclient", opts.KrtDebugger)
@@ -108,11 +108,11 @@ func (cl *Client) Run(stop <-chan struct{}) {
        }
 
        t0 := time.Now()
-       cl.logger.Infof("Starting Planet Kubernetes CRD controller")
+       cl.logger.Infof("Starting Dubbo Kubernetes CRD controller")
        if !kube.WaitForCacheSync("crdclient", stop, cl.informerSynced) {
-               cl.logger.Infof("Failed to sync Planet Kubernetes CRD 
controller cache")
+               cl.logger.Infof("Failed to sync Dubbo Kubernetes CRD controller 
cache")
        } else {
-               cl.logger.Infof("Planet Kubernetes CRD controller synced in 
%v", time.Since(t0))
+               cl.logger.Infof("Dubbo Kubernetes CRD controller synced in %v", 
time.Since(t0))
        }
        <-stop
        close(cl.stop)
diff --git a/dubbod/discovery/pkg/config/kube/crdclient/types.go 
b/dubbod/discovery/pkg/config/kube/crdclient/types.go
index 1b9e2ce4..5e8167a4 100644
--- a/dubbod/discovery/pkg/config/kube/crdclient/types.go
+++ b/dubbod/discovery/pkg/config/kube/crdclient/types.go
@@ -349,7 +349,7 @@ func patch(c kube.Client, orig config.Config, origMeta 
metav1.ObjectMeta, mod co
                        Group:    "networking.dubbo.apache.org",
                        Version:  "v1alpha3",
                        Resource: "destinationrules",
-               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "planet-discovery"})
+               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "dubbo-discovery"})
        case gvk.PeerAuthentication:
                origSpec := 
orig.Spec.(*orgapachedubboapisecurityv1alpha3.PeerAuthentication)
                modSpec := 
mod.Spec.(*orgapachedubboapisecurityv1alpha3.PeerAuthentication)
@@ -371,7 +371,7 @@ func patch(c kube.Client, orig config.Config, origMeta 
metav1.ObjectMeta, mod co
                        Group:    "security.dubbo.apache.org",
                        Version:  "v1alpha3",
                        Resource: "peerauthentications",
-               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "planet-discovery"})
+               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "dubbo-discovery"})
        case gvk.VirtualService:
                // VirtualService uses networking.dubbo.apache.org API group, 
use Dynamic client
                origSpec := 
orig.Spec.(*orgapachedubboapinetworkingv1alpha3.VirtualService)
@@ -394,7 +394,7 @@ func patch(c kube.Client, orig config.Config, origMeta 
metav1.ObjectMeta, mod co
                        Group:    "networking.dubbo.apache.org",
                        Version:  "v1alpha3",
                        Resource: "virtualservices",
-               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "planet-discovery"})
+               }).Namespace(orig.Namespace).Patch(context.TODO(), orig.Name, 
typ, patchBytes, metav1.PatchOptions{FieldManager: "dubbo-discovery"})
        case gvk.GatewayClass:
                oldRes := &sigsk8siogatewayapiapisv1.GatewayClass{
                        ObjectMeta: origMeta,
@@ -424,7 +424,7 @@ func patch(c kube.Client, orig config.Config, origMeta 
metav1.ObjectMeta, mod co
                        return nil, err
                }
                return c.GatewayAPI().GatewayV1().Gateways(orig.Namespace).
-                       Patch(context.TODO(), orig.Name, typ, patchBytes, 
metav1.PatchOptions{FieldManager: "planet-discovery"})
+                       Patch(context.TODO(), orig.Name, typ, patchBytes, 
metav1.PatchOptions{FieldManager: "dubbo-discovery"})
        case gvk.HTTPRoute:
                oldRes := &sigsk8siogatewayapiapisv1.HTTPRoute{
                        ObjectMeta: origMeta,
diff --git a/dubbod/discovery/pkg/config/kube/file/controller.go 
b/dubbod/discovery/pkg/config/kube/file/controller.go
index c1bf5928..43ef5ded 100644
--- a/dubbod/discovery/pkg/config/kube/file/controller.go
+++ b/dubbod/discovery/pkg/config/kube/file/controller.go
@@ -66,7 +66,7 @@ func NewController(fileDir string, domainSuffix string, 
schemas collection.Schem
        data := make(map[config.GroupVersionKind]kindStore)
        for _, s := range schemas.All() {
                gvk := s.GroupVersionKind()
-               if _, ok := collections.Planet.FindByGroupVersionKind(gvk); ok {
+               if _, ok := collections.Dubbo.FindByGroupVersionKind(gvk); ok {
                        collection := krt.NewCollection(mainCollection, 
func(ctx krt.HandlerContext, c ConfigKind) *config.Config {
                                if c.GroupVersionKind == gvk {
                                        return c.Config
diff --git a/dubbod/discovery/pkg/features/experimental.go 
b/dubbod/discovery/pkg/features/experimental.go
index 699de332..3ffe8aef 100644
--- a/dubbod/discovery/pkg/features/experimental.go
+++ b/dubbod/discovery/pkg/features/experimental.go
@@ -19,7 +19,7 @@ package features
 import "github.com/apache/dubbo-kubernetes/pkg/env"
 
 var (
-       CACertConfigMapName = env.Register("PLANET_CA_CERT_CONFIGMAP", 
"dubbo-ca-root-cert",
+       CACertConfigMapName = env.Register("DUBBO_CA_CERT_CONFIGMAP", 
"dubbo-ca-root-cert",
                "The name of the ConfigMap that stores the Root CA Certificate 
that is used by dubbod").Get()
        EnableLeaderElection = env.Register("ENABLE_LEADER_ELECTION", true,
                "If enabled (default), starts a leader election client and 
gains leadership before executing controllers. "+
@@ -27,13 +27,13 @@ var (
        EnableEnhancedDestinationRuleMerge = 
env.Register("ENABLE_ENHANCED_DESTINATIONRULE_MERGE", true,
                "If enabled, Dubbo merge destinationrules considering their 
exportTo fields,"+
                        " they will be kept as independent rules if the 
exportTos are not equal.").Get()
-       EnableGatewayAPI = env.Register("PLANET_ENABLE_GATEWAY_API", true,
+       EnableGatewayAPI = env.Register("DUBBO_ENABLE_GATEWAY_API", true,
                "If this is set to true, support for Kubernetes gateway-api 
(github.com/kubernetes-sigs/gateway-api) will "+
                        " be enabled. In addition to this being enabled, the 
gateway-api CRDs need to be installed.").Get()
-       EnableGatewayAPIStatus = 
env.Register("PLANET_ENABLE_GATEWAY_API_STATUS", true,
+       EnableGatewayAPIStatus = 
env.Register("DUBBO_ENABLE_GATEWAY_API_STATUS", true,
                "If this is set to true, gateway-api resources will have status 
written to them").Get()
-       EnableGatewayAPIGatewayClassController = 
env.Register("PLANET_ENABLE_GATEWAY_API_GATEWAYCLASS_CONTROLLER", true,
+       EnableGatewayAPIGatewayClassController = 
env.Register("DUBBO_ENABLE_GATEWAY_API_GATEWAYCLASS_CONTROLLER", true,
                "If this is set to true, dubbod will create and manage its 
default GatewayClasses").Get()
-       EnableGatewayAPIDeploymentController = 
env.Register("PLANET_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER", true,
+       EnableGatewayAPIDeploymentController = 
env.Register("DUBBO_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER", true,
                "If this is set to true, gateway-api resources will 
automatically provision in cluster deployment, services, etc").Get()
 )
diff --git a/dubbod/discovery/pkg/features/planet.go 
b/dubbod/discovery/pkg/features/planet.go
index f3178e17..7f055dc2 100644
--- a/dubbod/discovery/pkg/features/planet.go
+++ b/dubbod/discovery/pkg/features/planet.go
@@ -40,13 +40,13 @@ var (
                "If this is set to false, will not create CA server in 
dubbod.").Get()
        // EnableCACRL ToDo (nilekh): remove this feature flag once it's stable
        EnableCACRL = env.Register(
-               "PLANET_ENABLE_CA_CRL",
+               "DUBBO_ENABLE_CA_CRL",
                true, // Default value (true = feature enabled by default)
                "If set to false, Dubbo will not watch for the ca-crl.pem file 
in the /etc/cacerts directory "+
                        "and will not distribute CRL data to namespaces for 
proxies to consume.",
        ).Get()
-       PlanetCertProvider = env.Register("PLANET_CERT_PROVIDER", 
constants.CertProviderDubbod,
-               "The provider of Planet DNS certificate. K8S RA will be used 
for k8s.io/NAME. 'dubbod' value will sign"+
+       DubboCertProvider = env.Register("DUBBO_CERT_PROVIDER", 
constants.CertProviderDubbod,
+               "The provider of Dubbo DNS certificate. K8S RA will be used for 
k8s.io/NAME. 'dubbod' value will sign"+
                        " using Dubbo build in CA. Other values will not not 
generate TLS certs, but still "+
                        " distribute ./etc/certs/root-cert.pem. Only used if 
custom certificates are not mounted.").Get()
        DubbodServiceCustomHost = env.Register("DUBBOD_CUSTOM_HOST", "",
@@ -56,10 +56,10 @@ var (
                "Name of the mutatingwebhookconfiguration to patch, if dubboctl 
is not used.").Get()
        ResolveHostnameGateways = env.Register("RESOLVE_HOSTNAME_GATEWAYS", 
true,
                "If true, hostnames in the LoadBalancer addresses of a Service 
will be resolved at the control plane for use in cross-network gateways.").Get()
-       ManagedGatewayController = 
env.Register("PLANET_GATEWAY_API_CONTROLLER_NAME", 
"dubbo.apache.org/gateway-controller",
+       ManagedGatewayController = 
env.Register("DUBBO_GATEWAY_API_CONTROLLER_NAME", 
"dubbo.apache.org/gateway-controller",
                "Gateway API controller name. dubbod will only reconcile 
Gateway API resources referencing a GatewayClass with this controller 
name").Get()
-       GatewayAPIDefaultGatewayClass = 
env.Register("PLANET_GATEWAY_API_DEFAULT_GATEWAYCLASS_NAME", "dubbo",
+       GatewayAPIDefaultGatewayClass = 
env.Register("DUBBO_GATEWAY_API_DEFAULT_GATEWAYCLASS_NAME", "dubbo",
                "Name of the default GatewayClass").Get()
-       StatusMaxWorkers = env.Register("PLANET_STATUS_MAX_WORKERS", 100, "The 
maximum number of workers"+
+       StatusMaxWorkers = env.Register("DUBBO_STATUS_MAX_WORKERS", 100, "The 
maximum number of workers"+
                " for status update").Get()
 )
diff --git a/dubbod/discovery/pkg/features/security.go 
b/dubbod/discovery/pkg/features/security.go
index 9bb11907..5087460c 100644
--- a/dubbod/discovery/pkg/features/security.go
+++ b/dubbod/discovery/pkg/features/security.go
@@ -24,8 +24,8 @@ var (
                "If enabled, dubbod will use a secret named cacerts to store 
its self-signed dubbo-"+
                        "generated root certificate.").Get()
        EnableXDSIdentityCheck = env.Register(
-               "PLANET_ENABLE_XDS_IDENTITY_CHECK",
+               "DUBBO_ENABLE_XDS_IDENTITY_CHECK",
                true,
-               "If enabled, planet will authorize XDS clients, to ensure they 
are acting only as namespaces they have permissions for.",
+               "If enabled, dubbo will authorize XDS clients, to ensure they 
are acting only as namespaces they have permissions for.",
        ).Get()
 )
diff --git a/dubbod/discovery/pkg/features/tuning.go 
b/dubbod/discovery/pkg/features/tuning.go
index c4d90238..8acf1fdb 100644
--- a/dubbod/discovery/pkg/features/tuning.go
+++ b/dubbod/discovery/pkg/features/tuning.go
@@ -29,7 +29,7 @@ var (
                "Sets the maximum number of concurrent grpc streams.",
        ).Get()
 
-       // MaxRecvMsgSize The max receive buffer size of gRPC received channel 
of Planet in bytes.
+       // MaxRecvMsgSize The max receive buffer size of gRPC received channel 
of Dubbo in bytes.
        MaxRecvMsgSize = env.Register(
                "DUBBO_GPRC_MAXRECVMSGSIZE",
                4*1024*1024,
@@ -38,7 +38,7 @@ var (
 
        RequestLimit = func() float64 {
                v := env.Register(
-                       "PLANET_MAX_REQUESTS_PER_SECOND",
+                       "DUBBO_MAX_REQUESTS_PER_SECOND",
                        0.0,
                        "Limits the number of incoming XDS requests per second. 
On larger machines this can be increased to handle more proxies concurrently. "+
                                "If set to 0 or unset, the max will be 
automatically determined based on the machine size",
@@ -56,30 +56,30 @@ var (
        }()
 
        DebounceAfter = env.Register(
-               "PLANET_DEBOUNCE_AFTER",
+               "DUBBO_DEBOUNCE_AFTER",
                100*time.Millisecond,
                "The delay added to config/registry events for debouncing. This 
will delay the push by "+
                        "at least this interval. If no change is detected 
within this period, the push will happen, "+
-                       " otherwise we'll keep delaying until things settle, up 
to a max of PLANET_DEBOUNCE_MAX.",
+                       " otherwise we'll keep delaying until things settle, up 
to a max of DUBBO_DEBOUNCE_MAX.",
        ).Get()
 
        DebounceMax = env.Register(
-               "PLANET_DEBOUNCE_MAX",
+               "DUBBO_DEBOUNCE_MAX",
                10*time.Second,
                "The maximum amount of time to wait for events while 
debouncing. If events keep showing up with no breaks "+
                        "for this time, we'll trigger a push.",
        ).Get()
 
        EnableEDSDebounce = env.Register(
-               "PLANET_ENABLE_EDS_DEBOUNCE",
+               "DUBBO_ENABLE_EDS_DEBOUNCE",
                true,
-               "If enabled, Planet will include EDS pushes in the push 
debouncing, configured by PLANET_DEBOUNCE_AFTER and PLANET_DEBOUNCE_MAX."+
+               "If enabled, Dubbo will include EDS pushes in the push 
debouncing, configured by DUBBO_DEBOUNCE_AFTER and DUBBO_DEBOUNCE_MAX."+
                        " EDS pushes may be delayed, but there will be fewer 
pushes. By default this is enabled",
        ).Get()
 
        PushThrottle = func() int {
                v := env.Register(
-                       "PLANET_PUSH_THROTTLE",
+                       "DUBBO_PUSH_THROTTLE",
                        0,
                        "Limits the number of concurrent pushes allowed. On 
larger machines this can be increased for faster pushes. "+
                                "If set to 0 or unset, the max will be 
automatically determined based on the machine size",
@@ -95,8 +95,8 @@ var (
                // 32: 100
                return min(15+5*procs, 100)
        }()
-       XDSCacheMaxSize = env.Register("PLANET_XDS_CACHE_SIZE", 60000,
+       XDSCacheMaxSize = env.Register("DUBBO_XDS_CACHE_SIZE", 60000,
                "The maximum number of cache entries for the XDS cache.").Get()
-       XDSCacheIndexClearInterval = 
env.Register("PLANET_XDS_CACHE_INDEX_CLEAR_INTERVAL", 5*time.Second,
+       XDSCacheIndexClearInterval = 
env.Register("DUBBO_XDS_CACHE_INDEX_CLEAR_INTERVAL", 5*time.Second,
                "The interval for xds cache index clearing.").Get()
 )
diff --git a/dubbod/discovery/pkg/features/xds.go 
b/dubbod/discovery/pkg/features/xds.go
index 6af37991..24430050 100644
--- a/dubbod/discovery/pkg/features/xds.go
+++ b/dubbod/discovery/pkg/features/xds.go
@@ -19,12 +19,12 @@ package features
 import "github.com/apache/dubbo-kubernetes/pkg/env"
 
 var (
-       EnableCDSCaching = env.Register("PLANET_ENABLE_CDS_CACHE", true,
-               "If true, PLANET will cache CDS responses. Note: this depends 
on PLANET_ENABLE_XDS_CACHE.").Get()
+       EnableCDSCaching = env.Register("DUBBO_ENABLE_CDS_CACHE", true,
+               "If true, DUBBO will cache CDS responses. Note: this depends on 
DUBBO_ENABLE_XDS_CACHE.").Get()
 
-       EnableRDSCaching = env.Register("PLANET_ENABLE_RDS_CACHE", true,
-               "If true, PLANET will cache RDS responses. Note: this depends 
on PLANET_ENABLE_XDS_CACHE.").Get()
+       EnableRDSCaching = env.Register("DUBBO_ENABLE_RDS_CACHE", true,
+               "If true, DUBBO will cache RDS responses. Note: this depends on 
DUBBO_ENABLE_XDS_CACHE.").Get()
 
-       EnableXDSCaching = env.Register("PLANET_ENABLE_XDS_CACHE", true,
-               "If true, Planet will cache XDS responses.").Get()
+       EnableXDSCaching = env.Register("DUBBO_ENABLE_XDS_CACHE", true,
+               "If true, DUBBO will cache XDS responses.").Get()
 )
diff --git 
a/dubbod/discovery/pkg/serviceregistry/kube/controller/multicluster.go 
b/dubbod/discovery/pkg/serviceregistry/kube/controller/multicluster.go
index ef558be1..0e1aba57 100644
--- a/dubbod/discovery/pkg/serviceregistry/kube/controller/multicluster.go
+++ b/dubbod/discovery/pkg/serviceregistry/kube/controller/multicluster.go
@@ -36,7 +36,7 @@ func (k *kubeController) Close() {
 }
 
 type Multicluster struct {
-       // serverID of this planet instance used for leader election
+       // serverID of this dubbo instance used for leader election
        serverID string
 
        // options to use when creating kube controllers
@@ -124,7 +124,7 @@ func (m *Multicluster) initializeCluster(cluster 
*multicluster.Cluster, kubeCont
                                        nc := NewNamespaceController(client, 
m.caBundleWatcher)
                                        // Start informers again. This fixes 
the case where informers for namespace do not start,
                                        // as we create them only after 
acquiring the leader lock
-                                       // Note: stop here should be the 
overall planet stop, NOT the leader election stop. We are
+                                       // Note: stop here should be the 
overall dubbo stop, NOT the leader election stop. We are
                                        // basically lazy loading the informer, 
if we stop it when we lose the lock we will never
                                        // recreate it again.
                                        client.RunAndWait(clusterStopCh)
diff --git a/dubbod/discovery/pkg/xds/discovery.go 
b/dubbod/discovery/pkg/xds/discovery.go
index cb826d37..1aadcf17 100644
--- a/dubbod/discovery/pkg/xds/discovery.go
+++ b/dubbod/discovery/pkg/xds/discovery.go
@@ -370,7 +370,6 @@ func (s *DiscoveryServer) ProxyUpdate(clusterID cluster.ID, 
ip string) {
                }
        }
 
-       // It is possible that the envoy has not connected to this planet, 
maybe connected to another planet
        if connection == nil {
                return
        }
diff --git a/go.sum b/go.sum
index f44e229c..46c095d4 100644
--- a/go.sum
+++ b/go.sum
@@ -402,6 +402,9 @@ github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.2 
h1:sGm2vDRFUrQJO/Veii4h4z
 github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.2/go.mod 
h1:wd1YpapPLivG6nQgbf7ZkG1hhSOXDhhn4MLTknx2aAc=
 github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 
h1:Ovs26xHkKqVztRpIrF/92BcuyuQ/YW4NSIpoGtfXNho=
 github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod 
h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
+github.com/grpc-ecosystem/grpc-gateway v1.16.0 
h1:gmcG1KaJ57LophUzW0Hy8NmPhnMZb4M0+kPpLofRdBo=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.3 
h1:5ZPtiqj0JL5oKWmcsq4VMaAW5ukBEgSGXEN89zeH1Jo=
+github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.3/go.mod 
h1:ndYquD05frm2vACXE1nsccT4oJzjhw2arTS2cpUD1PI=
 github.com/hashicorp/errwrap v1.0.0/go.mod 
h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
 github.com/hashicorp/errwrap v1.1.0 
h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=
 github.com/hashicorp/errwrap v1.1.0/go.mod 
h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
@@ -524,8 +527,12 @@ github.com/munnerz/goautoneg 
v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod 
h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
 github.com/nikolalohinski/gonja v1.5.3 
h1:GsA+EEaZDZPGJ8JtpeGN78jidhOlxeJROpqMT9fTj9c=
 github.com/nikolalohinski/gonja v1.5.3/go.mod 
h1:RmjwxNiXAEqcq1HeK5SSMmqFJvKOfTfXhkJv6YBtPa4=
+github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE=
+github.com/nxadm/tail v1.4.8/go.mod 
h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU=
 github.com/onsi/ginkgo v1.6.0/go.mod 
h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
 github.com/onsi/ginkgo v1.8.0/go.mod 
h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
+github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
+github.com/onsi/ginkgo v1.16.5/go.mod 
h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
 github.com/onsi/ginkgo/v2 v2.25.3 
h1:Ty8+Yi/ayDAGtk4XxmmfUy4GabvM+MegeB4cDLRi6nw=
 github.com/onsi/ginkgo/v2 v2.25.3/go.mod 
h1:43uiyQC4Ed2tkOzLsEYm7hnrb7UJTWHYNsuy3bG/snE=
 github.com/onsi/gomega v1.5.0/go.mod 
h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
@@ -697,6 +704,10 @@ 
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 h1:F7Jx+6h
 go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0/go.mod 
h1:UHB22Z8QsdRDrnAtX4PntOl36ajSxcdUMt1sF7Y6E7Q=
 go.opentelemetry.io/otel v1.37.0 
h1:9zhNfelUvx0KBfu/gb+ZgeAfAgtWrfHJZcAqFC228wQ=
 go.opentelemetry.io/otel v1.37.0/go.mod 
h1:ehE/umFRLnuLa/vSccNq9oS1ErUlkkK71gMcN34UG8I=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.34.0 
h1:OeNbIYk/2C15ckl7glBlOBp5+WlYsOElzTNmiPW/x60=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.34.0/go.mod 
h1:7Bept48yIeqxP2OZ9/AqIpYS94h2or0aB4FypJTc8ZM=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.34.0 
h1:tgJ0uaNS4c98WRNUEx5U3aDlrDOI5Rs+1Vifcw4DJ8U=
+go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.34.0/go.mod 
h1:U7HYyW0zt/a9x5J1Kjs+r1f/d4ZHnYFclhYY2+YbeoE=
 go.opentelemetry.io/otel/metric v1.37.0 
h1:mvwbQS5m0tbmqML4NqK+e3aDiO02vsf/WgbsdpcPoZE=
 go.opentelemetry.io/otel/metric v1.37.0/go.mod 
h1:04wGrZurHYKOc+RKeye86GwKiTb9FKm1WHtO+4EVr2E=
 go.opentelemetry.io/otel/sdk v1.37.0 
h1:ItB0QUqnjesGRvNcmAcU0LyvkVyGJ2xftD29bWdDvKI=
@@ -705,6 +716,8 @@ go.opentelemetry.io/otel/sdk/metric v1.37.0 
h1:90lI228XrB9jCMuSdA0673aubgRobVZFh
 go.opentelemetry.io/otel/sdk/metric v1.37.0/go.mod 
h1:cNen4ZWfiD37l5NhS+Keb5RXVWZWpRE+9WyVCpbo5ps=
 go.opentelemetry.io/otel/trace v1.37.0 
h1:HLdcFNbRQBE2imdSEgm/kwqmQj1Or1l/7bW6mxVK7z4=
 go.opentelemetry.io/otel/trace v1.37.0/go.mod 
h1:TlgrlQ+PtQO5XFerSPUYG0JSgGyryXewPGyayAWSBS0=
+go.opentelemetry.io/proto/otlp v1.7.0 
h1:jX1VolD6nHuFzOYso2E73H85i92Mv8JQYk0K9vz09os=
+go.opentelemetry.io/proto/otlp v1.7.0/go.mod 
h1:fSKjH6YJ7HDlwzltzyMj036AJ3ejJLCgCSHGj4efDDo=
 go.starlark.net v0.0.0-20230302034142-4b1e35fe2254 
h1:Ss6D3hLXTM0KobyBYEAygXzFfGcjnmfEJOBgSbemCtg=
 go.starlark.net v0.0.0-20230302034142-4b1e35fe2254/go.mod 
h1:jxU+3+j+71eXOW14274+SmmuW82qJzl6iZSeqEtTGds=
 go.uber.org/atomic v1.7.0/go.mod 
h1:fEN4uk6kAWBTFdckzkM89CLk9XfWZrxpCo0nPH17wJc=
@@ -833,6 +846,10 @@ golang.org/x/tools 
v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4f
 golang.org/x/tools v0.1.12/go.mod 
h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
 golang.org/x/tools v0.36.0 h1:kWS0uv/zsvHEle1LbV5LE8QujrxB3wfQyxHfhOk0Qkg=
 golang.org/x/tools v0.36.0/go.mod 
h1:WBDiHKJK8YgLHlcQPYQzNCkUxUypCaa5ZegCVutKm+s=
+golang.org/x/tools/go/expect v0.1.1-deprecated 
h1:jpBZDwmgPhXsKZC6WhL20P4b/wmnpsEAGHaNy0n/rJM=
+golang.org/x/tools/go/expect v0.1.1-deprecated/go.mod 
h1:eihoPOH+FgIqa3FpoTwguz/bVUSGBlGQU67vpBeOrBY=
+golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated 
h1:1h2MnaIAIXISqTFKdENegdpAgUXz6NrPEsbIeWaBRvM=
+golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated/go.mod 
h1:RVAQXBGNv1ib0J382/DPCRS/BPnsGebyM1Gj5VSDpG8=
 golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
@@ -885,6 +902,7 @@ gopkg.in/inf.v0 v0.9.1/go.mod 
h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw=
 gopkg.in/ini.v1 v1.51.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k=
 gopkg.in/ini.v1 v1.67.0 h1:Dgnx+6+nfE+IfzjUEISNeydPJh9AXNNsWbGP9KzCsOA=
 gopkg.in/ini.v1 v1.67.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k=
+gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 
h1:uRGJdciOHaEIrze2W8Q3AKkepLTh2hOroT7a+7czfdQ=
 gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod 
h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw=
 gopkg.in/warnings.v0 v0.1.2 h1:wFXVbFY8DY5/xOe1ECiWdKCzZlxgshcYVNkBHstARME=
 gopkg.in/warnings.v0 v0.1.2/go.mod 
h1:jksf8JmL6Qr/oQM2OXTHunEvvTAsrWBLb6OOjuVWRNI=
@@ -911,10 +929,14 @@ k8s.io/apiextensions-apiserver v0.34.1 
h1:NNPBva8FNAPt1iSVwIE0FsdrVriRXMsaWFMqJb
 k8s.io/apiextensions-apiserver v0.34.1/go.mod 
h1:hP9Rld3zF5Ay2Of3BeEpLAToP+l4s5UlxiHfqRaRcMc=
 k8s.io/apimachinery v0.34.1 h1:dTlxFls/eikpJxmAC7MVE8oOeP1zryV7iRyIjB0gky4=
 k8s.io/apimachinery v0.34.1/go.mod 
h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
+k8s.io/apiserver v0.34.1 h1:U3JBGdgANK3dfFcyknWde1G6X1F4bg7PXuvlqt8lITA=
+k8s.io/apiserver v0.34.1/go.mod h1:eOOc9nrVqlBI1AFCvVzsob0OxtPZUCPiUJL45JOTBG0=
 k8s.io/cli-runtime v0.33.3 h1:Dgy4vPjNIu8LMJBSvs8W0LcdV0PX/8aGG1DA1W8lklA=
 k8s.io/cli-runtime v0.33.3/go.mod 
h1:yklhLklD4vLS8HNGgC9wGiuHWze4g7x6XQZ+8edsKEo=
 k8s.io/client-go v0.34.1 h1:ZUPJKgXsnKwVwmKKdPfw4tB58+7/Ik3CrjOEhsiZ7mY=
 k8s.io/client-go v0.34.1/go.mod h1:kA8v0FP+tk6sZA0yKLRG67LWjqufAoSHA2xVGKw9Of8=
+k8s.io/component-base v0.34.1 h1:v7xFgG+ONhytZNFpIz5/kecwD+sUhVE6HU7qQUiRM4A=
+k8s.io/component-base v0.34.1/go.mod 
h1:mknCpLlTSKHzAQJJnnHVKqjxR7gBeHRv0rPXA7gdtQ0=
 k8s.io/gengo v0.0.0-20251215205346-5ee0d033ba5b 
h1:X0Afwan8Q1l7bMcNgh6DAah2jKCQ2irT7EoAXIChFqk=
 k8s.io/gengo v0.0.0-20251215205346-5ee0d033ba5b/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
 k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
@@ -928,6 +950,8 @@ k8s.io/utils v0.0.0-20250820121507-0af2bda4dd1d 
h1:wAhiDyZ4Tdtt7e46e9M5ZSAJ/MnPG
 k8s.io/utils v0.0.0-20250820121507-0af2bda4dd1d/go.mod 
h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
 nhooyr.io/websocket v1.8.7 h1:usjR2uOr/zjjkVMy0lW+PPohFok7PCow5sDjLgX4P4g=
 nhooyr.io/websocket v1.8.7/go.mod 
h1:B70DZP8IakI65RVQ51MsWP/8jndNma26DVA/nFSCgW0=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.31.2 
h1:jpcvIRr3GLoUoEKRkHKSmGjxb6lWwrBlJsXc+eUYQHM=
+sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.31.2/go.mod 
h1:Ve9uj1L+deCXFrPOk1LpFXqTg7LCFzFso6PA48q/XZw=
 sigs.k8s.io/controller-tools v0.19.0 
h1:OU7jrPPiZusryu6YK0jYSjPqg8Vhf8cAzluP9XGI5uk=
 sigs.k8s.io/controller-tools v0.19.0/go.mod 
h1:y5HY/iNDFkmFla2CfQoVb2AQXMsBk4ad84iR1PLANB0=
 sigs.k8s.io/gateway-api v1.4.1 h1:NPxFutNkKNa8UfLd2CMlEuhIPMQgDQ6DXNKG9sHbJU8=
diff --git a/manifests/charts/base/files/crd-all.gen.yaml 
b/manifests/charts/base/files/crd-all.gen.yaml
index 0c6c1dea..04730e6f 100644
--- a/manifests/charts/base/files/crd-all.gen.yaml
+++ b/manifests/charts/base/files/crd-all.gen.yaml
@@ -5,7 +5,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     heritage: Tiller
     release: dubbo
@@ -139,7 +139,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     heritage: Tiller
     release: dubbo
@@ -258,7 +258,7 @@ metadata:
   annotations:
     "helm.sh/resource-policy": keep
   labels:
-    app: dubbo-planet
+    app: dubbo
     chart: dubbo
     dubbo: security
     heritage: Tiller
diff --git a/manifests/charts/dubbo-control/dubbo-discovery/files/gateway.yaml 
b/manifests/charts/dubbo-control/dubbo-discovery/files/gateway.yaml
index 01a0a2c3..66896c7a 100644
--- a/manifests/charts/dubbo-control/dubbo-discovery/files/gateway.yaml
+++ b/manifests/charts/dubbo-control/dubbo-discovery/files/gateway.yaml
@@ -61,7 +61,7 @@ spec:
         - --domain
         - $(POD_NAMESPACE).svc.cluster.local
         env:
-        - name: PLANET_CERT_PROVIDER
+        - name: DUBBO_CERT_PROVIDER
           value: dubbod
         - name: CA_ADDR
           value: dubbod.dubbo-system.svc:15012
diff --git 
a/manifests/charts/dubbo-control/dubbo-discovery/files/grpc-agent.yaml 
b/manifests/charts/dubbo-control/dubbo-discovery/files/grpc-agent.yaml
index 620e12c8..744dee17 100644
--- a/manifests/charts/dubbo-control/dubbo-discovery/files/grpc-agent.yaml
+++ b/manifests/charts/dubbo-control/dubbo-discovery/files/grpc-agent.yaml
@@ -38,7 +38,7 @@ spec:
         postStart:
           exec:
             command:
-              - planet-agent
+              - dubbo-agent
               - wait
               - --url=http://localhost:15020/healthz/ready
       readinessProbe:
@@ -58,7 +58,7 @@ spec:
           value: /etc/dubbo/proxy/grpc-bootstrap.json
         - name: OUTPUT_CERTS
           value: /var/lib/dubbo/data
-        - name: PLANET_CERT_PROVIDER
+        - name: DUBBO_CERT_PROVIDER
           value: dubbod
         - name: DUBBO_META_CLUSTER_ID
           value: Kubernetes
diff --git 
a/manifests/charts/dubbo-control/dubbo-discovery/templates/deployment.yaml 
b/manifests/charts/dubbo-control/dubbo-discovery/templates/deployment.yaml
index bc965ba7..95fad726 100644
--- a/manifests/charts/dubbo-control/dubbo-discovery/templates/deployment.yaml
+++ b/manifests/charts/dubbo-control/dubbo-discovery/templates/deployment.yaml
@@ -41,7 +41,7 @@ spec:
           env:
             - name: REVISION
               value: default
-            - name: PLANET_CERT_PROVIDER
+            - name: DUBBO_CERT_PROVIDER
               value: dubbod
             - name: CLUSTER_ID
               value: "Kubernetes"
diff --git a/manifests/charts/dubbo-control/dubbo-discovery/values.yaml 
b/manifests/charts/dubbo-control/dubbo-discovery/values.yaml
index 991d319f..7ef132da 100644
--- a/manifests/charts/dubbo-control/dubbo-discovery/values.yaml
+++ b/manifests/charts/dubbo-control/dubbo-discovery/values.yaml
@@ -32,7 +32,7 @@ _internal_default_values_not_set:
   global:
     dubboNamespace: dubbo-system
 
-    planetCertProvider: dubbod
+    dubboCertProvider: dubbod
     proxy:
       image: ""
 
diff --git a/manifests/profiles/default.yaml b/manifests/profiles/default.yaml
index 51d7ea59..4dcded86 100644
--- a/manifests/profiles/default.yaml
+++ b/manifests/profiles/default.yaml
@@ -28,7 +28,7 @@ spec:
       zookeeper:
         enabled: false
     discovery:
-      planet:
+      dubbo:
         enabled: true
   dashboard:
     admin:
diff --git a/operator/pkg/apis/types.go b/operator/pkg/apis/types.go
index dda08517..4aeba903 100644
--- a/operator/pkg/apis/types.go
+++ b/operator/pkg/apis/types.go
@@ -56,7 +56,7 @@ type DubboComponentSpec struct {
        Base *BaseComponentSpec `json:"base,omitempty"`
        // Using Zookeeper and Nacos as the registration plane.
        Register *RegisterSpec `json:"register,omitempty"`
-       // Using Planet as the control plane.
+       // Using Dubbo as the control plane.
        Discovery *DiscoverySpec `json:"discovery,omitempty"`
 }
 
@@ -72,8 +72,8 @@ type RegisterSpec struct {
 }
 
 type DiscoverySpec struct {
-       // Planet component
-       Planet *DiscoveryComponentSpec `json:"planet,omitempty"`
+       // Dubbo component
+       Dubbo *DiscoveryComponentSpec `json:"dubbo,omitempty"`
 }
 
 type BaseComponentSpec struct {
diff --git a/operator/pkg/component/component.go 
b/operator/pkg/component/component.go
index 6da301f9..55f6c21d 100644
--- a/operator/pkg/component/component.go
+++ b/operator/pkg/component/component.go
@@ -28,8 +28,7 @@ const (
        BaseComponentName              Name = "Base"
        NacosRegisterComponentName     Name = "Nacos"
        ZookeeperRegisterComponentName Name = "Zookeeper"
-       AdminComponentName             Name = "Admin"
-       PlanetDiscoveryComponentName   Name = "Planet"
+       DubboDiscoveryComponentName    Name = "Dubbo-Discovery"
 )
 
 type Component struct {
@@ -70,14 +69,14 @@ var AllComponents = []Component{
                HelmValuesTreeRoot: "admin",
        },
        {
-               UserFacingName:     PlanetDiscoveryComponentName,
-               SpecName:           "planet",
+               UserFacingName:     DubboDiscoveryComponentName,
+               SpecName:           "dubbo",
                ResourceType:       "Deployment",
                ResourceName:       "dubbod",
                ContainerName:      "dubbo-discovery",
                Default:            true,
                HelmSubDir:         "dubbo-control/dubbo-discovery",
-               HelmValuesTreeRoot: "planet",
+               HelmValuesTreeRoot: "dubbo-discovery",
        },
        {
                UserFacingName:     NacosRegisterComponentName,
@@ -104,7 +103,7 @@ var AllComponents = []Component{
 var (
        userFacingCompNames = map[Name]string{
                BaseComponentName:              "Dubbo Resource Core",
-               PlanetDiscoveryComponentName:   "Dubbo Control Plane",
+               DubboDiscoveryComponentName:    "Dubbo Control Plane",
                NacosRegisterComponentName:     "Nacos Register Plane",
                ZookeeperRegisterComponentName: "Zookeeper Register Plane",
                AdminComponentName:             "Admin Dashboard",
@@ -115,7 +114,7 @@ var (
                NacosRegisterComponentName:     "🔨",
                ZookeeperRegisterComponentName: "🔧️",
                AdminComponentName:             "🔭",
-               PlanetDiscoveryComponentName:   "🪐",
+               DubboDiscoveryComponentName:    "🪐",
        }
 )
 
diff --git a/operator/pkg/install/installer.go 
b/operator/pkg/install/installer.go
index 73415b19..73af8584 100644
--- a/operator/pkg/install/installer.go
+++ b/operator/pkg/install/installer.go
@@ -253,13 +253,13 @@ func (i Installer) prune(manifests 
[]manifest.ManifestSet) error {
 }
 
 var componentDependencies = map[component.Name][]component.Name{
-       component.PlanetDiscoveryComponentName: {
+       component.DubboDiscoveryComponentName: {
                component.AdminComponentName,
        },
        component.NacosRegisterComponentName:     {},
        component.ZookeeperRegisterComponentName: {},
        component.BaseComponentName: {
-               component.PlanetDiscoveryComponentName,
+               component.DubboDiscoveryComponentName,
                component.NacosRegisterComponentName,
                component.ZookeeperRegisterComponentName,
        },
diff --git a/operator/pkg/uninstall/prune.go b/operator/pkg/uninstall/prune.go
index 68b5e29d..609c7fad 100644
--- a/operator/pkg/uninstall/prune.go
+++ b/operator/pkg/uninstall/prune.go
@@ -96,7 +96,7 @@ func GetRemovedResources(kc kube.CLIClient, dopName, 
dopNamespace string, includ
                        result, err = c.List(context.Background(), 
metav1.ListOptions{LabelSelector: s.Add(*compReq).String()})
                } else {
                        includeCN := []string{
-                               string(component.PlanetDiscoveryComponentName),
+                               string(component.DubboDiscoveryComponentName),
                        }
                        includeRequirement, lerr := 
klabels.NewRequirement(manifest.DubboComponentLabel, selection.In, includeCN)
                        if lerr != nil {
diff --git a/pkg/adsc/adsc.go b/pkg/adsc/adsc.go
index b5fa6595..80206f46 100644
--- a/pkg/adsc/adsc.go
+++ b/pkg/adsc/adsc.go
@@ -183,11 +183,11 @@ func setDefaultConfig(config *Config) Config {
 }
 
 func ConfigInitialRequests() []*discovery.DiscoveryRequest {
-       out := make([]*discovery.DiscoveryRequest, 0, 
len(collections.Planet.All())+1)
+       out := make([]*discovery.DiscoveryRequest, 0, 
len(collections.Dubbo.All())+1)
        out = append(out, &discovery.DiscoveryRequest{
                TypeUrl: gvk.MeshGlobalConfig.String(),
        })
-       for _, sch := range collections.Planet.All() {
+       for _, sch := range collections.Dubbo.All() {
                out = append(out, &discovery.DiscoveryRequest{
                        TypeUrl: sch.GroupVersionKind().String(),
                })
diff --git a/pkg/bootstrap/config.go b/pkg/bootstrap/config.go
index 6592b138..b3908e9a 100644
--- a/pkg/bootstrap/config.go
+++ b/pkg/bootstrap/config.go
@@ -47,7 +47,7 @@ type MetadataOptions struct {
        InstanceIPs            []string
        StsPort                int
        ProxyConfig            *meshAPI.ProxyConfig
-       PlanetSubjectAltName   []string
+       DubboSubjectAltName    []string
        CredentialSocketExists bool
        XDSRootCert            string
        annotationFilePath     string
@@ -125,7 +125,7 @@ func GetNodeMetaData(options MetadataOptions) (*model.Node, 
error) {
        }
 
        meta.ProxyConfig = (*model.NodeMetaProxyConfig)(options.ProxyConfig)
-       meta.PlanetSubjectAltName = options.PlanetSubjectAltName
+       meta.DubboSubjectAltName = options.DubboSubjectAltName
        meta.XDSRootCert = options.XDSRootCert
        if options.CredentialSocketExists {
                untypedMeta[security.CredentialMetaDataName] = "true"
diff --git a/pkg/config/constants/constants.go 
b/pkg/config/constants/constants.go
index 2df004ef..ef71031a 100644
--- a/pkg/config/constants/constants.go
+++ b/pkg/config/constants/constants.go
@@ -40,15 +40,15 @@ const (
 
        StatPrefixDelimiter = ";"
 
-       PlanetWellKnownDNSCertPath   = "./var/run/secrets/dubbod/tls/"
-       PlanetWellKnownDNSCaCertPath = "./var/run/secrets/dubbod/ca/"
-
-       ConfigPathDir                       = "./etc/dubbo/proxy"
-       KeyFilename                         = "key.pem"
-       DefaultPlanetTLSCert                = PlanetWellKnownDNSCertPath + 
"tls.crt"
-       DefaultPlanetTLSKey                 = PlanetWellKnownDNSCertPath + 
"tls.key"
-       DefaultPlanetTLSCaCert              = PlanetWellKnownDNSCaCertPath + 
"root-cert.pem"
-       DefaultPlanetTLSCaCertAlternatePath = PlanetWellKnownDNSCertPath + 
"ca.crt"
+       DubboWellKnownDNSCertPath   = "./var/run/secrets/dubbod/tls/"
+       DubboWellKnownDNSCaCertPath = "./var/run/secrets/dubbod/ca/"
+
+       ConfigPathDir                      = "./etc/dubbo/proxy"
+       KeyFilename                        = "key.pem"
+       DefaultDubboTLSCert                = DubboWellKnownDNSCertPath + 
"tls.crt"
+       DefaultDubboTLSKey                 = DubboWellKnownDNSCertPath + 
"tls.key"
+       DefaultDubboTLSCaCert              = DubboWellKnownDNSCaCertPath + 
"root-cert.pem"
+       DefaultDubboTLSCaCertAlternatePath = DubboWellKnownDNSCertPath + 
"ca.crt"
 
        AlwaysReject = "internal.dubbo.apache.org/webhook-always-reject"
 
diff --git a/pkg/config/schema/collections/collections.agent.go 
b/pkg/config/schema/collections/collections.agent.go
index 5c29d2aa..79ad81db 100644
--- a/pkg/config/schema/collections/collections.agent.go
+++ b/pkg/config/schema/collections/collections.agent.go
@@ -144,17 +144,17 @@ var (
                ValidateProto: validation.EmptyValidate,
        }.MustBuild()
 
-       Planet = collection.NewSchemasBuilder().
+       Dubbo = collection.NewSchemasBuilder().
                MustAdd(PeerAuthentication).
                MustAdd(DestinationRule).
                MustAdd(VirtualService).
                Build()
 
-       planetGatewayAPI = collection.NewSchemasBuilder().
-                               MustAdd(GatewayClass).
-                               MustAdd(Gateway).
-                               MustAdd(HTTPRoute).
-                               Build()
+       dubboGatewayAPI = collection.NewSchemasBuilder().
+                       MustAdd(GatewayClass).
+                       MustAdd(Gateway).
+                       MustAdd(HTTPRoute).
+                       Build()
 
        All = collection.NewSchemasBuilder().
                MustAdd(PeerAuthentication).
diff --git a/pkg/config/schema/collections/collections.go 
b/pkg/config/schema/collections/collections.go
index 4c4d4c1f..e11f9b67 100644
--- a/pkg/config/schema/collections/collections.go
+++ b/pkg/config/schema/collections/collections.go
@@ -144,17 +144,17 @@ var (
                ValidateProto: validation.EmptyValidate,
        }.MustBuild()
 
-       Planet = collection.NewSchemasBuilder().
+       Dubbo = collection.NewSchemasBuilder().
                MustAdd(PeerAuthentication).
                MustAdd(DestinationRule).
                MustAdd(VirtualService).
                Build()
 
-       planetGatewayAPI = collection.NewSchemasBuilder().
-                               MustAdd(GatewayClass).
-                               MustAdd(Gateway).
-                               MustAdd(HTTPRoute).
-                               Build()
+       dubboGatewayAPI = collection.NewSchemasBuilder().
+                       MustAdd(GatewayClass).
+                       MustAdd(Gateway).
+                       MustAdd(HTTPRoute).
+                       Build()
 
        All = collection.NewSchemasBuilder().
                MustAdd(PeerAuthentication).
diff --git a/pkg/config/schema/collections/gateway.go 
b/pkg/config/schema/collections/gateway.go
index e6999156..4d2ff3b8 100644
--- a/pkg/config/schema/collections/gateway.go
+++ b/pkg/config/schema/collections/gateway.go
@@ -20,6 +20,6 @@ import (
        "github.com/apache/dubbo-kubernetes/pkg/config/schema/collection"
 )
 
-func PlanetGatewayAPI() collection.Schemas {
-       return planetGatewayAPI
+func DubboGatewayAPI() collection.Schemas {
+       return dubboGatewayAPI
 }
diff --git a/pkg/dubboagent/agent.go b/pkg/dubboagent/agent.go
index 4115fc55..e1ea26f4 100644
--- a/pkg/dubboagent/agent.go
+++ b/pkg/dubboagent/agent.go
@@ -156,7 +156,7 @@ func (a *Agent) Run(ctx context.Context) (func(), error) {
 
        var bootstrapNode *core.Node
        if a.cfg.GRPCBootstrapPath != "" {
-               log.Infof("Starting planet-agent with GRPC bootstrap path: %s", 
a.cfg.GRPCBootstrapPath)
+               log.Infof("Starting dubbo-agent with GRPC bootstrap path: %s", 
a.cfg.GRPCBootstrapPath)
                node, err := a.generateGRPCBootstrapWithNode()
                if err != nil {
                        return nil, fmt.Errorf("failed generating gRPC XDS 
bootstrap: %v", err)
@@ -279,7 +279,7 @@ func (a *Agent) FindRootCAForXDS() (string, error) {
        } else if a.secOpts.FileMountedCerts {
                // FileMountedCerts - Load it from Proxy Metadata.
                rootCAPath = a.proxyConfig.ProxyMetadata[MetadataClientRootCert]
-       } else if a.secOpts.PlanetCertProvider == constants.CertProviderNone {
+       } else if a.secOpts.DubboCertProvider == constants.CertProviderNone {
                return "", fmt.Errorf("root CA file for XDS required but 
configured provider as none")
        } else {
                rootCAPath = path.Join(DubboCACertPath, 
constants.CACertNamespaceConfigMapDataName)
@@ -319,7 +319,7 @@ func (a *Agent) FindRootCAForCA() (string, error) {
                return "", nil
        } else if a.cfg.CARootCerts != "" {
                rootCAPath = a.cfg.CARootCerts
-       } else if a.secOpts.PlanetCertProvider == constants.CertProviderCustom {
+       } else if a.secOpts.DubboCertProvider == constants.CertProviderCustom {
                rootCAPath = security.DefaultRootCertFilePath // 
./etc/certs/root-cert.pem
        } else if a.secOpts.ProvCert != "" {
                // This was never completely correct - PROV_CERT are only 
intended for auth with CA_ADDR,
@@ -327,7 +327,7 @@ func (a *Agent) FindRootCAForCA() (string, error) {
                // For VMs, the root cert file used to auth may be populated 
afterwards.
                // Thus, return directly here and skip checking for existence.
                return a.secOpts.ProvCert + "/root-cert.pem", nil
-       } else if a.secOpts.PlanetCertProvider == constants.CertProviderNone {
+       } else if a.secOpts.DubboCertProvider == constants.CertProviderNone {
                return "", fmt.Errorf("root CA file for CA required but 
configured provider as none")
        } else {
                rootCAPath = path.Join(DubboCACertPath, 
constants.CACertNamespaceConfigMapDataName)
@@ -529,9 +529,9 @@ func (a *Agent) newSecretManager(createCaClient bool) 
(*cache.SecretManagerClien
 }
 
 func (a *Agent) generateNodeMetadata() (*model.Node, error) {
-       var planetSAN []string
+       var dubboSAN []string
        if a.proxyConfig.ControlPlaneAuthPolicy == 
mesh.AuthenticationPolicy_MUTUAL_TLS {
-               planetSAN = 
[]string{config.GetPlanetSan(a.proxyConfig.DiscoveryAddress)}
+               dubboSAN = 
[]string{config.GetDubboSan(a.proxyConfig.DiscoveryAddress)}
        }
 
        credentialSocketExists, err := checkSocket(context.TODO(), 
security.CredentialNameSocketPath)
@@ -548,7 +548,7 @@ func (a *Agent) generateNodeMetadata() (*model.Node, error) 
{
                InstanceIPs:            a.cfg.ProxyIPAddresses,
                StsPort:                a.secOpts.STSPort,
                ProxyConfig:            a.proxyConfig,
-               PlanetSubjectAltName:   planetSAN,
+               DubboSubjectAltName:    dubboSAN,
                CredentialSocketExists: credentialSocketExists,
                XDSRootCert:            a.cfg.XDSRootCerts,
                MetadataDiscovery:      a.cfg.MetadataDiscovery,
diff --git a/pkg/dubboagent/grpcxds/grpc_bootstrap.go 
b/pkg/dubboagent/grpcxds/grpc_bootstrap.go
index 08070949..00a56768 100644
--- a/pkg/dubboagent/grpcxds/grpc_bootstrap.go
+++ b/pkg/dubboagent/grpcxds/grpc_bootstrap.go
@@ -217,7 +217,7 @@ func extractMeta(node *model.Node) (*structpb.Struct, 
error) {
        }
 
        // Fix ClusterName oneof field in PROXY_CONFIG to be a string instead 
of object
-       // This is needed because planet-discovery expects ClusterName as a 
string, not a oneof object
+       // This is needed because dubbo-discovery expects ClusterName as a 
string, not a oneof object
        if proxyConfigRaw, ok := rawMeta["PROXY_CONFIG"].(map[string]any); ok {
                if clusterNameRaw, ok := 
proxyConfigRaw["ClusterName"].(map[string]any); ok {
                        // Convert {"ServiceCluster": "dubbo-proxy"} to just 
"dubbo-proxy"
diff --git a/pkg/dubboagent/xds_proxy.go b/pkg/dubboagent/xds_proxy.go
index b7da3336..f7e2ff30 100644
--- a/pkg/dubboagent/xds_proxy.go
+++ b/pkg/dubboagent/xds_proxy.go
@@ -387,7 +387,7 @@ func (p *XdsProxy) handleUpstreamRequest(con 
*ProxyConnection) {
                        con.nodeMutex.RUnlock()
 
                        // For XDS, any first request (not just LDS) without 
Node should wait
-                       // because planet-discovery needs Node in the first 
request to initialize connection
+                       // because dubbo-discovery needs Node in the first 
request to initialize connection
                        if !nodeReceived.Load() && req.Node == nil && 
req.TypeUrl != model.HealthInfoType {
                                proxyLog.Debugf("connection #%d received first 
request without Node (TypeUrl=%s), waiting for Node information", con.conID, 
model.GetShortType(req.TypeUrl))
                                continue
diff --git a/pkg/dubboagent/xds_proxy_delta.go 
b/pkg/dubboagent/xds_proxy_delta.go
index cd41545a..08946da6 100644
--- a/pkg/dubboagent/xds_proxy_delta.go
+++ b/pkg/dubboagent/xds_proxy_delta.go
@@ -155,7 +155,7 @@ func (p *XdsProxy) handleUpstreamDeltaRequest(con 
*ProxyConnection) {
                        con.nodeMutex.RUnlock()
 
                        // For Delta XDS, any first request (not just LDS) 
without Node should wait
-                       // because planet-discovery needs Node in the first 
request to initialize connection
+                       // because dubbo-discovery needs Node in the first 
request to initialize connection
                        if !nodeReceived.Load() && req.Node == nil && 
req.TypeUrl != model.HealthInfoType {
                                proxyLog.Debugf("delta connection #%d received 
first request without Node (TypeUrl=%s), waiting for Node information", 
con.conID, model.GetShortType(req.TypeUrl))
                                continue
diff --git a/pkg/model/proxy.go b/pkg/model/proxy.go
index 2259ce0e..ec64951a 100644
--- a/pkg/model/proxy.go
+++ b/pkg/model/proxy.go
@@ -59,14 +59,14 @@ type Node struct {
 }
 
 type NodeMetadata struct {
-       Generator            string               `json:"GENERATOR,omitempty"`
-       ClusterID            cluster.ID           `json:"CLUSTER_ID,omitempty"`
-       Namespace            string               `json:"NAMESPACE,omitempty"`
-       StsPort              string               `json:"STS_PORT,omitempty"`
-       MetadataDiscovery    *StringBool          
`json:"METADATA_DISCOVERY,omitempty"`
-       ProxyConfig          *NodeMetaProxyConfig 
`json:"PROXY_CONFIG,omitempty"`
-       PlanetSubjectAltName []string             `json:"PLANET_SAN,omitempty"`
-       XDSRootCert          string               `json:"-"`
+       Generator           string               `json:"GENERATOR,omitempty"`
+       ClusterID           cluster.ID           `json:"CLUSTER_ID,omitempty"`
+       Namespace           string               `json:"NAMESPACE,omitempty"`
+       StsPort             string               `json:"STS_PORT,omitempty"`
+       MetadataDiscovery   *StringBool          
`json:"METADATA_DISCOVERY,omitempty"`
+       ProxyConfig         *NodeMetaProxyConfig `json:"PROXY_CONFIG,omitempty"`
+       DubboSubjectAltName []string             `json:"DUBBO_SAN,omitempty"`
+       XDSRootCert         string               `json:"-"`
 }
 
 type BootstrapNodeMetadata struct {
diff --git a/pkg/security/security.go b/pkg/security/security.go
index 82c302d7..f2dac62a 100644
--- a/pkg/security/security.go
+++ b/pkg/security/security.go
@@ -110,7 +110,7 @@ type Options struct {
        ServeOnlyFiles       bool
        ProvCert             string
        FileMountedCerts     bool
-       PlanetCertProvider   string
+       DubboCertProvider    string
        OutputKeyCertToDir   string
        CertChainFilePath    string
        KeyFilePath          string
diff --git a/tools/build-tools/docker/Dockerfile 
b/tools/build-tools/docker/Dockerfile
index b9c80c08..94c06ca7 100644
--- a/tools/build-tools/docker/Dockerfile
+++ b/tools/build-tools/docker/Dockerfile
@@ -78,8 +78,8 @@ FROM binary_tools_context_base AS go_tools_2
 
 # Build Dubbo Kubernetes kubetype-gen and protoc-gen-crd tool from source.
 # Copy pre-built kubetype-gen binary from project root
-COPY --chmod=755 ./tools/bin/kubetype-gen /tmp/go/bin/kubetype-gen
-COPY --chmod=755 ./tools/bin/protoc-gen-crd /tmp/go/bin/protoc-gen-crd
+COPY --chmod=755 ./tools/cmd/bin/kubetype-gen /tmp/go/bin/kubetype-gen
+COPY --chmod=755 ./tools/cmd/bin/protoc-gen-crd /tmp/go/bin/protoc-gen-crd
 
 FROM ubuntu:noble AS base_os_context
 

Reply via email to