-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update authorization links #9465
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -548,7 +548,7 @@ spec: | |
|
||
### 客户端使用 Secret API | ||
|
||
当部署与 secret API 交互的应用程序时,应使用诸如 [RBAC](https://kubernetes.io/docs/admin/authorization/rbac/) 之类的 [授权策略](https://kubernetes.io/docs/admin/authorization/) 来限制访问。 | ||
当部署与 secret API 交互的应用程序时,应使用诸如 [RBAC](https://kubernetes.io/docs/admin/authorization/rbac/) 之类的 [授权策略](https://kubernetes.io/docs/reference/access-authn-authz/authorization/) 来限制访问。 | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We usually don't touch the translated pages because it may cause unwanted conflicts when the translators are merging their work back. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Noted. I'll remove the changes for anything in cn across this and the other outstanding PRs I have that touch that area. |
||
|
||
Secret 中的值对于不同的环境来说重要性可能不同,例如对于 Kubernetes 集群内部(例如 service account 令牌)和集群外部来说就不一样。即使一个应用程序可以理解其期望的与之交互的 secret 有多大的能力,但是同一命名空间中的其他应用程序却可能不这样认为。 | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -51,7 +51,7 @@ To subdivide access to the kubelet API, delegate authorization to the API server | |
* start the kubelet with the `--authorization-mode=Webhook` and the `--kubeconfig` flags | ||
* the kubelet calls the `SubjectAccessReview` API on the configured API server to determine whether each request is authorized | ||
|
||
The kubelet authorizes API requests using the same [request attributes](/docs/admin/authorization/#request-attributes) approach as the apiserver. | ||
The kubelet authorizes API requests using the same [request attributes](/docs/reference/access-authn-authz/authorization/) approach as the apiserver. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Same as above. May want to make this a little bit specific. |
||
|
||
The verb is determined from the incoming request's HTTP verb: | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -50,7 +50,7 @@ you can see the `spec.serviceAccountName` field has been | |
|
||
You can access the API from inside a pod using automatically mounted service account credentials, | ||
as described in [Accessing the Cluster](/docs/user-guide/accessing-the-cluster/#accessing-the-api-from-a-pod). | ||
The API permissions a service account has depend on the [authorization plugin and policy](/docs/admin/authorization/#a-quick-note-on-service-accounts) in use. | ||
The API permissions of the service account depend on the [authorization plugin and policy](/docs/reference/access-authn-authz/authorization/#authorization-modules) in use. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm okay with the change of the link. |
||
|
||
In version 1.6+, you can opt out of automounting API credentials for a service account by setting | ||
`automountServiceAccountToken: false` on the service account: | ||
|
@@ -122,7 +122,7 @@ secrets: | |
|
||
then you will see that a token has automatically been created and is referenced by the service account. | ||
|
||
You may use authorization plugins to [set permissions on service accounts](/docs/admin/authorization/#a-quick-note-on-service-accounts). | ||
You may use authorization plugins to [set permissions on service accounts](docs/reference/access-authn-authz/authorization/). | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'd suggest we use /docs/reference/access-authn-authz/rbac/#service-account-permissions |
||
|
||
To use a non-default service account, simply set the `spec.serviceAccountName` | ||
field of a pod to the name of the service account you wish to use. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The link target should be /docs/reference/access-authn-authz/authorization/#review-your-request-attributes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thought so, but wasn't 100% sure on that. I'll correct both.