You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh-cn/docs/reference/access-authn-authz/certificate-signing-requests.md
+26-20Lines changed: 26 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ the `spec.request` field. The CertificateSigningRequest denotes the signer (the
73
73
recipient that the request is being made to) using the `spec.signerName` field.
74
74
Note that `spec.signerName` is a required key after API version `certificates.k8s.io/v1`.
75
75
In Kubernetes v1.22 and later, clients may optionally set the `spec.expirationSeconds`
76
-
field to request a particular lifetime for the issued certificate. The minimum valid
76
+
field to request a particular lifetime for the issued certificate. The minimum valid
77
77
value for this field is `600`, i.e. ten minutes.
78
78
-->
79
79
### 请求签名流程 {#request-signing-process}
@@ -223,7 +223,7 @@ signed, a security certificate.
223
223
224
224
Any signer that is made available for outside a particular cluster should provide information
225
225
about how the signer works, so that consumers can understand what that means for CertifcateSigningRequests
226
-
and (if enabled) [ClusterTrustBundles](#cluster-trust-bundles).
226
+
and (if enabled) [ClusterTrustBundles](#cluster-trust-bundles).
227
227
This includes:
228
228
-->
229
229
## 签名者 {#signers}
@@ -237,8 +237,10 @@ This includes:
237
237
<!--
238
238
1. **Trust distribution**: how trust anchors (CA certificates or certificate bundles) are distributed.
239
239
1. **Permitted subjects**: any restrictions on and behavior when a disallowed subject is requested.
240
-
1. **Permitted x509 extensions**: including IP subjectAltNames, DNS subjectAltNames, Email subjectAltNames, URI subjectAltNames etc, and behavior when a disallowed extension is requested.
241
-
1. **Permitted key usages / extended key usages**: any restrictions on and behavior when usages different than the signer-determined usages are specified in the CSR.
240
+
1. **Permitted x509 extensions**: including IP subjectAltNames, DNS subjectAltNames,
241
+
Email subjectAltNames, URI subjectAltNames etc, and behavior when a disallowed extension is requested.
242
+
1. **Permitted key usages / extended key usages**: any restrictions on and behavior
243
+
when usages different than the signer-determined usages are specified in the CSR.
242
244
1. **Expiration/certificate lifetime**: whether it is fixed by the signer, configurable by the admin, determined by the CSR `spec.expirationSeconds` field, etc
243
245
and the behavior when the signer-determined expiration is different from the CSR `spec.expirationSeconds` field.
244
246
1. **CA bit allowed/disallowed**: and behavior if a CSR contains a request a for a CA certificate when the signer does not permit it.
@@ -281,7 +283,7 @@ certificate expiration or lifetime. The expiration or lifetime therefore has to
281
283
through the `spec.expirationSeconds` field of the CSR object. The built-in signers
282
284
use the `ClusterSigningDuration` configuration option, which defaults to 1 year,
283
285
(the `--cluster-signing-duration` command-line flag of the kube-controller-manager)
284
-
as the default when no `spec.expirationSeconds` is specified. When `spec.expirationSeconds`
286
+
as the default when no `spec.expirationSeconds` is specified. When `spec.expirationSeconds`
285
287
is specified, the minimum of `spec.expirationSeconds` and `ClusterSigningDuration` is
The contents of ClusterTrustBundles can be injected into the container filesystem, similar to ConfigMaps and Secrets. See the [clusterTrustBundle projected volume source](/docs/concepts/storage/projected-volumes#clustertrustbundle) for more details.
875
+
The contents of ClusterTrustBundles can be injected into the container filesystem, similar to ConfigMaps and Secrets.
876
+
See the [clusterTrustBundle projected volume source](/docs/concepts/storage/projected-volumes#clustertrustbundle) for more details.
* Read [Manage TLS Certificates in a Cluster](/docs/tasks/tls/managing-tls-in-a-cluster/)
1077
-
* View the source code for the kube-controller-manager built in [signer](https://github.com/kubernetes/kubernetes/blob/32ec6c212ec9415f604ffc1f4c1f29b782968ff1/pkg/controller/certificates/signer/cfssl_signer.go)
1078
-
* View the source code for the kube-controller-manager built in [approver](https://github.com/kubernetes/kubernetes/blob/32ec6c212ec9415f604ffc1f4c1f29b782968ff1/pkg/controller/certificates/approver/sarapprove.go)
1081
+
* View the source code for the kube-controller-manager built in
0 commit comments