@@ -5,13 +5,11 @@ api_metadata:
5
5
kind : " CertificateSigningRequest"
6
6
content_type : " api_reference"
7
7
description : " CertificateSigningRequest 对象提供了一种通过提交证书签名请求并异步批准和颁发 x509 证书的机制。"
8
- title : " 证书签名请求 "
8
+ title : CertificateSigningRequest
9
9
weight : 4
10
- auto_generated : true
11
10
---
12
11
13
12
<!--
14
- ---
15
13
api_metadata:
16
14
apiVersion: "certificates.k8s.io/v1"
17
15
import: "k8s.io/api/certificates/v1"
@@ -21,18 +19,6 @@ description: "CertificateSigningRequest objects provide a mechanism to obtain x5
21
19
title: "CertificateSigningRequest"
22
20
weight: 4
23
21
auto_generated: true
24
- ---
25
- -->
26
-
27
- <!--
28
- The file is auto-generated from the Go source code of the component using a generic
29
- [generator](https://github.com/kubernetes-sigs/reference-docs/). To learn how
30
- to generate the reference documentation, please read
31
- [Contributing to the reference documentation](/docs/contribute/generate-ref-docs/).
32
- To update the reference content, please follow the
33
- [Contributing upstream](/docs/contribute/generate-ref-docs/contribute-upstream/)
34
- guide. You can file document formatting bugs against the
35
- [reference-docs](https://github.com/kubernetes-sigs/reference-docs/) project.
36
22
-->
37
23
38
24
<!--
@@ -59,8 +45,9 @@ Kubelets use this API to obtain:
59
45
CertificateSigningRequest 对象提供了一种通过提交证书签名请求并异步批准和颁发 x509 证书的机制。
60
46
61
47
Kubelets 使用 CertificateSigningRequest API 来获取:
62
- 1 . 向 kube-apiserver 进行身份认证的客户端证书(使用 “kubernetes.io/kube-apiserver-client-kubelet” signerName)。
63
- 2 . kube-apiserver 可以安全连接到 TLS 端点的服务证书(使用 “kubernetes.io/kubelet-serving” signerName)。
48
+
49
+ 1 . 向 kube-apiserver 进行身份认证的客户端证书(使用 “kubernetes.io/kube-apiserver-client-kubelet” signerName)。
50
+ 2 . kube-apiserver 可以安全连接到 TLS 端点的服务证书(使用 “kubernetes.io/kubelet-serving” signerName)。
64
51
65
52
<!--
66
53
This API can be used to request client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client" signerName),
@@ -117,21 +104,19 @@ or to obtain certificates from custom non-Kubernetes signers.
117
104
118
105
CertificateSigningRequestSpec contains the certificate request.
119
106
-->
120
- ## 证书签名请求规范 CertificateSigningRequestSpec {#CertificateSigningRequestSpec}
107
+ ## CertificateSigningRequestSpec {#CertificateSigningRequestSpec}
121
108
122
109
CertificateSigningRequestSpec 包含证书请求。
123
110
124
- <!--
125
111
<hr >
126
-
112
+ <!--
127
113
- **request** ([]byte), required
128
114
129
115
*Atomic: will be replaced during a merge*
130
116
131
117
request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
132
118
When serialized as JSON or YAML, the data is additionally base64-encoded.
133
119
-->
134
- <hr >
135
120
136
121
- ** request** ([ ] byte),必需
137
122
@@ -153,7 +138,7 @@ CertificateSigningRequestSpec 包含证书请求。
153
138
154
139
CertificateSigningRequests 的 list/watch 请求可以使用 “spec.signerName=NAME” 字段选择器进行过滤。
155
140
156
- <!--
141
+ <!--
157
142
Well-known Kubernetes signers are:
158
143
1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
159
144
Requests for this signer are never auto-approved by kube-controller-manager,
@@ -166,8 +151,9 @@ CertificateSigningRequestSpec 包含证书请求。
166
151
and can be issued by the "csrsigning" controller in kube-controller-manager.
167
152
168
153
More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
169
- -->
154
+ -->
170
155
众所周知的 Kubernetes 签名者有:
156
+
171
157
1 . “kubernetes.io/kube-apiserver-client”:颁发客户端证书,用于向 kube-apiserver 进行身份验证。
172
158
对此签名者的请求永远不会被 kube-controller-manager 自动批准,
173
159
可以由 kube-controller-manager 中的 “csrsigning” 控制器颁发。
@@ -180,7 +166,7 @@ CertificateSigningRequestSpec 包含证书请求。
180
166
181
167
更多详细信息,请访问 https://kubernetes.io/zh-cn/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
182
168
183
- <!--
169
+ <!--
184
170
Custom signerNames can also be specified. The signer defines:
185
171
1. Trust distribution: how trust (CA bundles) are distributed.
186
172
2. Permitted subjects: and behavior when a disallowed subject is requested.
@@ -190,8 +176,9 @@ CertificateSigningRequestSpec 包含证书请求。
190
176
4. Required, permitted, or forbidden key usages / extended key usages.
191
177
5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
192
178
6. Whether or not requests for CA certificates are allowed.
193
- -->
179
+ -->
194
180
也可以指定自定义 signerName。签名者定义如下:
181
+
195
182
1 . 信任分发:信任(CA 证书包)是如何分发的。
196
183
2 . 许可的主体:当请求不允许的主体时的行为。
197
184
3 . 请求中必需、许可或禁止的 x509 扩展(包括是否允许 subjectAltNames、哪些类型、对允许值的限制)
@@ -214,16 +201,16 @@ CertificateSigningRequestSpec 包含证书请求。
214
201
证书签署者可以颁发具有不同有效期的证书,
215
202
因此客户端必须检查颁发证书中 notBefore 和 notAfter 字段之间的增量以确定实际持续时间。
216
203
217
- <!--
204
+ <!--
218
205
The v1.22+ in-tree implementations of the well-known Kubernetes signers will honor this field
219
206
as long as the requested duration is not greater than the maximum duration they will honor per the
220
207
--cluster-signing-duration CLI flag to the Kubernetes controller manager.
221
- -->
208
+ -->
222
209
众所周知的 Kubernetes 签名者在 v1.22+ 版本内实现将遵守此字段,
223
210
只要请求的持续时间不大于最大持续时间,它们将遵守 Kubernetes 控制管理器的
224
211
--cluster-signing-duration CLI 标志。
225
212
226
- <!--
213
+ <!--
227
214
Certificate signers may not honor this field for various reasons:
228
215
229
216
1. Old signer that is unaware of the field (such as the in-tree
@@ -232,7 +219,7 @@ CertificateSigningRequestSpec 包含证书请求。
232
219
3. Signer whose configured minimum is longer than the requested duration
233
220
234
221
The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
235
- -->
222
+ -->
236
223
由于各种原因,证书签名者可能忽略此字段:
237
224
238
225
1 . 不认识此字段的旧签名者(如 v1.22 版本之前的实现)
@@ -299,7 +286,7 @@ CertificateSigningRequestSpec 包含证书请求。
299
286
300
287
TLS 服务证书的请求通常要求:"key encipherment"、"digital signature"、"server auth"。
301
288
302
- <!--
289
+ <!--
303
290
Valid values are:
304
291
"signing", "digital signature", "content commitment",
305
292
"key encipherment", "key agreement", "data encipherment",
@@ -308,15 +295,15 @@ CertificateSigningRequestSpec 包含证书请求。
308
295
"code signing", "email protection", "s/mime",
309
296
"ipsec end system", "ipsec tunnel", "ipsec user",
310
297
"timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
311
- -->
298
+ -->
312
299
有效值:
313
- "signing"、"digital signature"、"content commitment"、
314
- "key encipherment"、"key agreement"、"data encipherment"、
315
- "cert sign"、"crl sign"、"encipher only"、"decipher only"、"any"、
316
- "server auth"、"client auth"、
317
- "code signing"、"email protection"、"s/mime"、
318
- "ipsec end system"、"ipsec tunnel"、"ipsec user"、
319
- "timestamping"、"ocsp signing"、"microsoft sgc"、"netscape sgc"。
300
+ "signing"、"digital signature"、"content commitment"、
301
+ "key encipherment"、"key agreement"、"data encipherment"、
302
+ "cert sign"、"crl sign"、"encipher only"、"decipher only"、"any"、
303
+ "server auth"、"client auth"、
304
+ "code signing"、"email protection"、"s/mime"、
305
+ "ipsec end system"、"ipsec tunnel"、"ipsec user"、
306
+ "timestamping"、"ocsp signing"、"microsoft sgc"、"netscape sgc"。
320
307
321
308
<!--
322
309
- **username** (string)
@@ -337,7 +324,7 @@ and the issued certificate.
337
324
338
325
<hr>
339
326
-->
340
- ## 证书签名请求状态 CertificateSigningRequestStatus {#CertificateSigningRequestStatus}
327
+ ## CertificateSigningRequestStatus {#CertificateSigningRequestStatus}
341
328
342
329
CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败状态和颁发证书的状况。
343
330
@@ -363,30 +350,31 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
363
350
如果证书签名请求被拒绝,则添加类型为 “Denied” 的状况,并且保持该字段为空。
364
351
如果签名者不能颁发证书,则添加类型为 “Failed” 的状况,并且保持该字段为空。
365
352
366
- <!--
353
+ <!--
367
354
Validation requirements:
368
355
1. certificate must contain one or more PEM blocks.
369
356
2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
370
357
must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
371
358
3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
372
359
to allow for explanatory text as described in section 5.2 of RFC7468.
373
- -->
360
+ -->
374
361
验证要求:
362
+
375
363
1 . 证书必须包含一个或多个 PEM 块。
376
364
2 . 所有的 PEM 块必须有 “CERTIFICATE” 标签,不包含头和编码的数据,
377
365
必须是由 BER 编码的 ASN.1 证书结构,如 RFC5280 第 4 节所述。
378
366
3 . 非 PEM 内容可能出现在 “CERTIFICATE”PEM 块之前或之后,并且是未验证的,
379
367
允许如 RFC7468 5.2 节中描述的解释性文本。
380
368
381
- <!--
369
+ <!--
382
370
If more than one PEM block is present, and the definition of the requested spec.signerName does not indicate otherwise,
383
371
the first block is the issued certificate, and subsequent blocks should be treated as
384
372
intermediate certificates and presented in TLS handshakes.
385
- -->
373
+ -->
386
374
如果存在多个 PEM 块,并且所请求的 spec.signerName 的定义没有另外说明,
387
375
那么第一个块是颁发的证书,后续的块应该被视为中间证书并在 TLS 握手中呈现。
388
376
389
- <!--
377
+ <!--
390
378
The certificate is encoded in PEM format.
391
379
392
380
When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
@@ -396,17 +384,19 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
396
384
...
397
385
-----END CERTIFICATE-----
398
386
)
399
- -->
387
+ -->
400
388
证书编码为 PEM 格式。
401
389
402
390
当序列化为 JSON 或 YAML 时,数据额外采用 base64 编码,它包括:
391
+
403
392
```
404
393
base64(
405
394
-----BEGIN CERTIFICATE-----
406
395
...
407
396
-----END CERTIFICATE-----
408
397
)
409
398
```
399
+
410
400
<!--
411
401
- **conditions** ([]CertificateSigningRequestCondition)
412
402
*Map: unique values on key type will be kept during a merge*
@@ -420,21 +410,21 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
420
410
421
411
** Map:键类型的唯一值将在合并期间保留**
422
412
423
- 应用于请求的状况。已知的状况有 "Approved"、"Denied" 与 "Failed"。
413
+ 应用于请求的状况。已知的状况有 "Approved"、"Denied" 与 "Failed"。
424
414
425
- <a name =" CertificateSigningRequestCondition " ></a >
426
- ** CertificateSigningRequestCondition 描述 CertificateSigningRequest 对象的状况。**
415
+ <a name =" CertificateSigningRequestCondition " ></a >
416
+ ** CertificateSigningRequestCondition 描述 CertificateSigningRequest 对象的状况。**
427
417
428
- <!--
418
+ <!--
429
419
- **conditions.status** (string), required
430
420
431
421
status of the condition, one of True, False, Unknown. Approved, Denied, and Failed conditions may not be "False" or "Unknown".
432
- -->
422
+ -->
433
423
- ** conditions.status** (string),必需
434
424
435
425
状况的状态,True、False、Unknown 之一。Approved、Denied 与 Failed 的状况不可以是 "False" 或 "Unknown"。
436
426
437
- <!--
427
+ <!--
438
428
- **conditions.type** (string), required
439
429
type of the condition. Known conditions are "Approved", "Denied", and "Failed".
440
430
@@ -447,7 +437,7 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
447
437
Approved and Denied conditions are mutually exclusive. Approved, Denied, and Failed conditions cannot be removed once added.
448
438
449
439
Only one condition of a given type is allowed.
450
- -->
440
+ -->
451
441
- ** conditions.type** (string),必需
452
442
453
443
状况的类型。已知的状况是 "Approved"、"Denied" 与 "Failed"。
@@ -462,7 +452,7 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
462
452
463
453
给定类型只允许设置一种状况。
464
454
465
- <!--
455
+ <!--
466
456
- **conditions.lastTransitionTime** (Time)
467
457
468
458
lastTransitionTime is the time the condition last transitioned from one status to another.
@@ -472,7 +462,7 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
472
462
<a name="Time"></a>
473
463
*Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON.
474
464
Wrappers are provided for many of the factory methods that the time package offers.*
475
- -->
465
+ -->
476
466
477
467
- ** conditions.lastTransitionTime** (Time)
478
468
@@ -482,36 +472,36 @@ CertificateSigningRequestStatus 包含用于指示请求的批准/拒绝/失败
482
472
<a name =" Time " ></a >
483
473
** Time 是 time.Time 的包装器,支持正确编码为 YAML 和 JSON。为 time 包提供的许多工厂方法提供了包装器。**
484
474
485
- <!--
475
+ <!--
486
476
- **conditions.lastUpdateTime** (Time)
487
477
488
478
lastUpdateTime is the time of the last update to this condition
489
479
490
480
<a name="Time"></a>
491
481
*Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON.
492
482
Wrappers are provided for many of the factory methods that the time package offers.*
493
- -->
483
+ -->
494
484
- ** conditions.lastUpdateTime** (Time)
495
485
496
486
lastUpdateTime 是该状况最后一次更新的时间。
497
487
498
488
<a name =" Time " ></a >
499
489
** Time 是 time.Time 的包装器,支持正确编组为 YAML 和 JSON。为 time 包提供的许多工厂方法提供了包装器。**
500
490
501
- <!--
491
+ <!--
502
492
- **conditions.message** (string)
503
493
504
494
message contains a human readable message with details about the request state
505
- -->
495
+ -->
506
496
- ** conditions.message** (string)
507
497
508
498
message 包含一个人类可读的消息,包含关于请求状态的详细信息。
509
499
510
- <!--
500
+ <!--
511
501
- **conditions.reason** (string)
512
502
513
503
reason indicates a brief reason for the request state
514
- -->
504
+ -->
515
505
- ** conditions.reason** (string)
516
506
517
507
reason 表示请求状态的简短原因。
@@ -523,7 +513,7 @@ CertificateSigningRequestList is a collection of CertificateSigningRequest objec
523
513
524
514
<hr>
525
515
-->
526
- ## 证书签名请求列表 CertificateSigningRequestList {#CertificateSigningRequestList}
516
+ ## CertificateSigningRequestList {#CertificateSigningRequestList}
527
517
528
518
CertificateSigningRequestList 是 CertificateSigningRequest 对象的集合。
529
519
@@ -550,11 +540,8 @@ CertificateSigningRequestList 是 CertificateSigningRequest 对象的集合。
550
540
551
541
items 是 CertificateSigningRequest 对象的集合。
552
542
553
-
554
543
<!--
555
544
## Operations {#Operations}
556
-
557
- <hr>
558
545
-->
559
546
## 操作 {#Operations}
560
547
@@ -1597,4 +1584,4 @@ DELETE /apis/certificates.k8s.io/v1/certificatesigningrequests
1597
1584
1598
1585
200 (<a href="{{< ref "../common-definitions/status#Status" >}}">Status</a >): OK
1599
1586
1600
- 401: Unauthorized
1587
+ 401: Unauthorized
0 commit comments