Skip to content

Commit 1575e1e

Browse files
authored
Merge pull request #34341 from Sea-n/zh-psp-redirect
[zh] Fix link for PSP
2 parents b835209 + 34341de commit 1575e1e

File tree

5 files changed

+15
-14
lines changed

5 files changed

+15
-14
lines changed

content/zh-cn/docs/concepts/security/rbac-good-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ You can also use the deprecated [PodSecurityPolicy](/docs/concepts/policy/pod-se
215215
to restrict users' abilities to create privileged Pods (N.B. PodSecurityPolicy is scheduled for removal
216216
in version 1.25).
217217
-->
218-
你还可以使用已弃用的 [PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/)
218+
你还可以使用已弃用的 [PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/)
219219
机制以限制用户创建特权 Pod 的能力 (特别注意:PodSecurityPolicy 已计划在版本 1.25 中删除)。
220220

221221
<!--
@@ -235,7 +235,7 @@ PersistentVolumes, and constrained users should use PersistentVolumeClaims to ac
235235
-->
236236
### 持久卷的创建 {#persistent-volume-creation}
237237

238-
[PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems)
238+
[PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/#volumes-and-file-systems)
239239
文档中所述,创建 PersistentVolumes 的权限可以提权访问底层主机。
240240
如果需要访问 PersistentVolume,受信任的管理员应该创建 `PersistentVolume`
241241
受约束的用户应该使用 `PersistentVolumeClaim` 访问该存储。

content/zh-cn/docs/concepts/security/windows-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This page describes security considerations and best practices specific to the W
2626
<!--
2727
## Protection for Secret data on nodes
2828
-->
29-
## 保护节点上的 Secret 数据
29+
## 保护节点上的 Secret 数据 {#protection-for-secret-data-on-nodes}
3030

3131
<!--
3232
On Windows, data from Secrets are written out in clear text onto the node's local
@@ -48,7 +48,7 @@ operator, you should take both of the following additional measures:
4848
<!--
4949
## Container users
5050
-->
51-
## 容器用户
51+
## 容器用户 {#container-users}
5252

5353
<!--
5454
[RunAsUsername](/docs/tasks/configure-pod-container/configure-runasusername)
@@ -57,7 +57,7 @@ processes as specific user. This is roughly equivalent to
5757
[RunAsUser](/docs/concepts/policy/pod-security-policy/#users-and-groups).
5858
-->
5959
可以为 Windows Pod 或容器指定 [RunAsUsername](/zh/docs/tasks/configure-pod-container/configure-runasusername)
60-
以作为特定用户执行容器进程。这大致相当于 [RunAsUser](/zh/docs/concepts/policy/pod-security-policy/#users-and-groups)
60+
以作为特定用户执行容器进程。这大致相当于 [RunAsUser](/zh-cn/docs/concepts/security/pod-security-policy/#users-and-groups)
6161

6262
<!--
6363
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
@@ -92,7 +92,7 @@ Active Directory 身份运行。
9292
<!--
9393
## Pod-level security isolation
9494
-->
95-
## Pod 级安全隔离
95+
## Pod 级安全隔离 {#pod-level-security-isolation}
9696

9797
<!--
9898
Linux-specific pod security context mechanisms (such as SELinux, AppArmor, Seccomp, or custom

content/zh-cn/docs/tasks/administer-cluster/securing-a-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ to the metadata API, and avoid using provisioning data to deliver secrets.
268268
-->
269269
### 限制云元数据 API 访问
270270

271-
云平台(AWS, Azure, GCE 等)经常将 metadata 本地服务暴露给实例。
271+
云平台(AWSAzureGCE 等)经常将 metadata 本地服务暴露给实例。
272272
默认情况下,这些 API 可由运行在实例上的 Pod 访问,并且可以包含
273273
该云节点的凭据或配置数据(如 kubelet 凭据)。
274274
这些凭据可以用于在集群内升级或在同一账户下升级到其他云服务。
@@ -413,7 +413,7 @@ or run with elevated permissions if those service accounts are granted access to
413413
如果执行 Pod 创建操作的组件能够在 `kube-system` 这类名字空间中创建 Pod,
414414
则这类组件也可能获得意外的权限,因为这些 Pod 可以访问服务账户的 Secret,
415415
或者,如果对应服务帐户被授权访问宽松的
416-
[PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/)
416+
[PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/)
417417
它们就能以较高的权限运行。
418418

419419
<!--

content/zh-cn/docs/tasks/configure-pod-container/migrate-from-psp.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ admission controller. This can be done effectively using a combination of dry-ru
3131
<!--
3232
- Ensure the `PodSecurity` [feature gate](/docs/reference/command-line-tools-reference/feature-gates/#feature-gates-for-alpha-or-beta-features) is enabled.
3333
-->
34-
- 确保 `PodSecurity` [特性门控](/docs/reference/command-line-tools-reference/feature-gates/)被启用。
34+
- 确保 `PodSecurity` [特性门控](/zh-cn/docs/reference/command-line-tools-reference/feature-gates/)被启用。
3535

3636
<!--
3737
This page assumes you are already familiar with the basic [Pod Security Admission](/docs/concepts/security/pod-security-admission/)
@@ -307,7 +307,7 @@ need to be handled on a case-by-case basis later:
307307
- `.spec.allowPrivilegeEscalation` - (Only mutating if set to `false`) required for the Restricted
308308
profile.
309309
-->
310-
- `.spec.requiredDropCapabilities` - 需要此字段来为 Restricted 配置去掉 `ALL` 设置。
310+
- `.spec.requiredDropCapabilities` - 需要此字段来为 Restricted 配置去掉 `ALL` 设置。
311311
- `.spec.seLinux` - (仅针对带有 `MustRunAs` 规则的变更性设置)需要此字段来满足
312312
Baseline 和 Restricted 配置所需要的 SELinux 需求。
313313
- `.spec.runAsUser` - (仅针对带有 `RunAsAny` 规则的非变更性设置)需要此字段来为
@@ -556,7 +556,7 @@ Finally, you can effectively bypass PodSecurityPolicy at the namespace level by
556556
accounts in the namespace.
557557
-->
558558
最后,你可以通过将
559-
{{< example file="policy/privileged-psp.yaml" >}}完全特权的 PSP{{< /example >}}
559+
{{< example file="policy/privileged-psp.yaml" >}}完全特权的 PSP{{< /example >}}
560560
绑定到某名字空间中所有服务账户上,在名字空间层面绕过所有 PodSecurityPolicy。
561561

562562
```sh
@@ -594,7 +594,7 @@ kubectl delete -n $NAMESPACE rolebinding disable-psp
594594
<!--
595595
## 4. Review namespace creation processes {#review-namespace-creation-process}
596596
-->
597-
## 4. 审阅名字空间创建过程 {#review-namespace-creation-process}
597+
## 4. 审阅名字空间创建过程 {#review-namespace-creation-process}
598598

599599
<!--
600600
Now that existing namespaces have been updated to enforce Pod Security Admission, you should ensure
@@ -639,7 +639,7 @@ controller plugins:
639639
-->
640640
如果需要验证 PodSecurityPolicy 准入控制器不再被启用,你可以通过扮演某个无法访问任何
641641
PodSecurityPolicy 的用户来执行测试(参见
642-
[PodSecurityPolicy 示例](/zh/docs/concepts/policy/pod-security-policy/#example)),
642+
[PodSecurityPolicy 示例](/zh-cn/docs/concepts/security/pod-security-policy/#example)),
643643
或者通过检查 API 服务器的日志来进行验证。在启动期间,API
644644
服务器会输出日志行,列举所挂载的准入控制器插件。
645645

static/_redirects

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,7 @@
162162

163163
/docs/concepts/policy/pod-security-policy/ /docs/concepts/security/pod-security-policy/ 301
164164
/docs/consumer-guideline/pod-security-coverage/ /docs/concepts/security/pod-security-policy/ 301
165+
/zh-cn/docs/concepts/policy/pod-security-policy/ /zh-cn/docs/concepts/security/pod-security-policy/ 301
165166

166167
/docs/contribute/create-pull-request/ /docs/home/contribute/create-pull-request/ 301
167168
/docs/contribute/page-templates/ /docs/home/contribute/page-templates/ 301
@@ -248,7 +249,7 @@
248249
/docs/tasks/access-kubernetes-api/extend-api-custom-resource-definitions/ /docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/ 301
249250
/docs/tasks/access-kubernetes-api/setup-extension-api-server/ /docs/tasks/extend-kubernetes/setup-extension-api-server/ 301
250251

251-
/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-deprecation-affects-you/ /docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-removal-affects-you/ 301
252+
/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-deprecation-affects-you/ /docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-removal-affects-you/ 301
252253
/docs/tasks/administer-cluster/access-cluster-services/ /docs/tasks/access-application-cluster/access-cluster-services/ 301
253254
/docs/tasks/administer-cluster/apply-resource-quota-limit/ /docs/tasks/administer-cluster/quota-api-object/ 301
254255
/docs/tasks/administer-cluster/assign-pods-nodes/ /docs/tasks/configure-pod-container/assign-pods-nodes/ 301

0 commit comments

Comments
 (0)