You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can access the API from inside a pod using automatically mounted service account credentials,
69
-
as described in [Accessing the Cluster](/docs/tasks/accessing-application-cluster/access-cluster/).
70
-
The API permissions of the service account depend on the [authorization plugin and policy](/docs/reference/access-authn-authz/authorization/#authorization-modules) in use.
66
+
You can access the API from inside a pod using automatically mounted service account credentials, as described in
67
+
[Accessing the Cluster](/docs/tasks/access-application-cluster/access-cluster).
68
+
The API permissions of the service account depend on the
69
+
[authorization plugin and policy](/docs/reference/access-authn-authz/authorization/#authorization-modules) in use.
71
70
72
71
You can opt out of automounting API credentials on `/var/run/secrets/kubernetes.io/serviceaccount/token` for a service account by setting `automountServiceAccountToken: false` on the ServiceAccount:
@@ -281,13 +280,13 @@ The content of `token` is elided here.
281
280
282
281
### Create an imagePullSecret
283
282
284
-
- Create an imagePullSecret, as described in [Specifying ImagePullSecret on a Pod](/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod).
283
+
- Create an imagePullSecret, as described in [Specifying ImagePullSecrets on a Pod](/docs/concepts/containers/images/#specifying-imagepullsecrets-on-a-pod).
@@ -427,11 +426,8 @@ command line arguments to `kube-apiserver`:
427
426
428
427
<!--
429
428
* `--service-account-issuer`
430
-
It can be used as the Identifier of the service account token issuer. You can specify the
431
-
`--service-account-issuer` argument multiple times, this can be useful to enable a non-disruptive
432
-
change of the issuer. When this flag is specified multiple times, the first is used to generate
433
-
tokens and all are used to determine which issuers are accepted. You must be running Kubernetes
434
-
v1.22 or later to be able to specify `--service-account-issuer` multiple times.
429
+
430
+
It can be used as the Identifier of the service account token issuer. You can specify the `--service-account-issuer` argument multiple times, this can be useful to enable a non-disruptive change of the issuer. When this flag is specified multiple times, the first is used to generate tokens and all are used to determine which issuers are accepted. You must be running Kubernetes v1.22 or later to be able to specify `--service-account-issuer` multiple times.
435
431
-->
436
432
* `--service-account-issuer`
437
433
@@ -440,40 +436,32 @@ command line arguments to `kube-apiserver`:
File containing PEM-encoded x509 RSA or ECDSA private or public keys, used to verify
447
-
ServiceAccount tokens. The specified file can contain multiple keys, and the flag can be specified
448
-
multiple times with different files. If specified multiple times, tokens signed by any of the
449
-
specified keys are considered valid by the Kubernetes API server.
441
+
442
+
File containing PEM-encoded x509 RSA or ECDSA private or public keys, used to verify ServiceAccount tokens. The specified file can contain multiple keys, and the flag can be specified multiple times with different files. If specified multiple times, tokens signed by any of the specified keys are considered valid by the Kubernetes API server.
Path to the file that contains the current private key of the service account token issuer. The
461
-
issuer signs issued ID tokens with this private key.
452
+
453
+
Path to the file that contains the current private key of the service account token issuer. The issuer signs issued ID tokens with this private key.
462
454
-->
463
455
* `--service-account-signing-key-file`
464
456
465
457
指向包含当前服务账户令牌发放者的私钥的文件路径。
466
458
此发放者使用此私钥来签署所发放的 ID 令牌。
467
-
468
459
<!--
469
460
* `--api-audiences` (can be omitted)
470
-
The service account token authenticator validates that tokens used against the API are bound to
471
-
at least one of these audiences. If `api-audiences` is specified multiple times, tokens for any of
472
-
the specified audiences are considered valid by the Kubernetes API server. If the
473
-
`--service-account-issuer` flag is configured and this flag is not, this field defaults to a
474
-
single element list containing the issuer URL.
461
+
462
+
The service account token authenticator validates that tokens used against the API are bound to at least one of these audiences. If `api-audiences` is specified multiple times, tokens for any of the specified audiences are considered valid by the Kubernetes API server. If the `--service-account-issuer` flag is configured and this flag is not, this field defaults to a single element list containing the issuer URL.
475
463
-->
476
-
* `--api-audiences` (can be omitted)
464
+
* `--api-audiences` (可以省略)
477
465
478
466
服务账户令牌身份检查组件会检查针对 API 访问所使用的令牌,
479
467
确认令牌至少是被绑定到这里所给的受众(audiences)之一。
@@ -555,6 +543,7 @@ provider configuration at `{service-account-issuer}/.well-known/openid-configura
555
543
If the URL does not comply, the `ServiceAccountIssuerDiscovery` endpoints will
556
544
not be registered, even if the feature is enabled.
0 commit comments