You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Generally, the RBAC system prevents users from creating clusterroles with more rights than the user possesses.
296
+
Generally, the RBAC system prevents users from creating clusterroles with more rights than the user possesses.
295
297
The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
296
298
users with this right can effectively escalate their privileges.
297
299
-->
@@ -305,8 +307,8 @@ users with this right can effectively escalate their privileges.
305
307
<!--
306
308
### Bind verb
307
309
308
-
Similar to the `escalate` verb, granting users this right allows for the bypass of Kubernetes
309
-
in-built protections against privilege escalation, allowing users to create bindings to
310
+
Similar to the `escalate` verb, granting users this right allows for the bypass of Kubernetes
311
+
in-built protections against privilege escalation, allowing users to create bindings to
310
312
roles with rights they do not already have.
311
313
-->
312
314
### bind 动词 {#bind-verb}
@@ -317,8 +319,8 @@ roles with rights they do not already have.
317
319
<!--
318
320
### Impersonate verb
319
321
320
-
This verb allows users to impersonate and gain the rights of other users in the cluster.
321
-
Care should be taken when granting it, to ensure that excessive permissions cannot be gained
322
+
This verb allows users to impersonate and gain the rights of other users in the cluster.
323
+
Care should be taken when granting it, to ensure that excessive permissions cannot be gained
322
324
via one of the impersonated accounts.
323
325
-->
324
326
### impersonate 动词 {#impersonate-verb}
@@ -329,9 +331,9 @@ via one of the impersonated accounts.
329
331
<!--
330
332
### CSRs and certificate issuing
331
333
332
-
The CSR API allows for users with `create` rights to CSRs and `update` rights on `certificatesigningrequests/approval`
333
-
where the signer is `kubernetes.io/kube-apiserver-client` to create new client certificates
334
-
which allow users to authenticate to the cluster. Those client certificates can have arbitrary
334
+
The CSR API allows for users with `create` rights to CSRs and `update` rights on `certificatesigningrequests/approval`
335
+
where the signer is `kubernetes.io/kube-apiserver-client` to create new client certificates
336
+
which allow users to authenticate to the cluster. Those client certificates can have arbitrary
335
337
names including duplicates of Kubernetes system components. This will effectively allow for privilege escalation.
Copy file name to clipboardExpand all lines: content/zh-cn/docs/concepts/services-networking/ingress-controllers.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ Kubernetes 作为一个项目,目前支持和维护
92
92
<!--
93
93
* F5 BIG-IP [Container Ingress Services for Kubernetes](https://clouddocs.f5.com/containers/latest/userguide/kubernetes/)
94
94
lets you use an Ingress to configure F5 BIG-IP virtual servers.
95
-
* [FortiADC Ingress Controller](https://docs.fortinet.com/document/fortiadc/7.0.0/fortiadc-ingress-controller-1-0/742835/fortiadc-ingress-controller-overview) support the Kubernetes Ingress resources and allows you to manage FortiADC objects from Kubernetes
95
+
* [FortiADC Ingress Controller](https://docs.fortinet.com/document/fortiadc/7.0.0/fortiadc-ingress-controller/742835/fortiadc-ingress-controller-overview) support the Kubernetes Ingress resources and allows you to manage FortiADC objects from Kubernetes
96
96
* [Gloo](https://gloo.solo.io) is an open-source ingress controller based on [Envoy](https://www.envoyproxy.io),
97
97
which offers API gateway functionality.
98
98
* [HAProxy Ingress](https://haproxy-ingress.github.io/) is an ingress controller for
0 commit comments