Skip to content

Commit 5d8f946

Browse files
authored
Merge pull request #35410 from Sea-n/zh-ref-auth
[zh-cn] Update kubelet-authn-authz.md
2 parents 59bac98 + 35410de commit 5d8f946

File tree

1 file changed

+40
-40
lines changed

1 file changed

+40
-40
lines changed

content/zh-cn/docs/reference/access-authn-authz/kubelet-authn-authz.md

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,99 +1,99 @@
11
---
22
title: Kubelet 认证/鉴权
33
---
4-
<!--
4+
<!--
55
reviewers:
66
- liggitt
77
title: Kubelet authentication/authorization
88
-->
99

10-
<!--
11-
## Overview
10+
<!--
11+
## Overview
1212
-->
13-
## 概述
13+
## 概述 {#overview}
1414

15-
<!--
15+
<!--
1616
A kubelet's HTTPS endpoint exposes APIs which give access to data of varying sensitivity,
1717
and allow you to perform operations with varying levels of power on the node and within containers.
1818
-->
1919
kubelet 的 HTTPS 端点公开了 API,
2020
这些 API 可以访问敏感度不同的数据,
2121
并允许你在节点上和容器内以不同级别的权限执行操作。
2222

23-
<!--
23+
<!--
2424
This document describes how to authenticate and authorize access to the kubelet's HTTPS endpoint.
2525
-->
2626
本文档介绍了如何对 kubelet 的 HTTPS 端点的访问进行认证和鉴权。
2727

28-
<!--
29-
## Kubelet authentication
28+
<!--
29+
## Kubelet authentication
3030
-->
31-
## Kubelet 身份认证
31+
## Kubelet 身份认证 {#kubelet-authentication}
3232

33-
<!--
33+
<!--
3434
By default, requests to the kubelet's HTTPS endpoint that are not rejected by other configured
3535
authentication methods are treated as anonymous requests, and given a username of `system:anonymous`
3636
and a group of `system:unauthenticated`.
3737
-->
3838
默认情况下,未被已配置的其他身份认证方法拒绝的对 kubelet 的 HTTPS 端点的请求会被视为匿名请求,
3939
并被赋予 `system:anonymous` 用户名和 `system:unauthenticated` 组。
4040

41-
<!--
41+
<!--
4242
To disable anonymous access and send `401 Unauthorized` responses to unauthenticated requests:
4343
-->
4444
要禁用匿名访问并向未经身份认证的请求发送 `401 Unauthorized` 响应,请执行以下操作:
4545

46-
<!--
47-
* start the kubelet with the `--anonymous-auth=false` flag
46+
<!--
47+
* start the kubelet with the `--anonymous-auth=false` flag
4848
-->
4949
*`--anonymous-auth=false` 标志启动 kubelet
5050

51-
<!--
51+
<!--
5252
To enable X509 client certificate authentication to the kubelet's HTTPS endpoint:
5353
-->
5454
要对 kubelet 的 HTTPS 端点启用 X509 客户端证书认证:
5555

56-
<!--
56+
<!--
5757
* start the kubelet with the `--client-ca-file` flag, providing a CA bundle to verify client certificates with
5858
* start the apiserver with `--kubelet-client-certificate` and `--kubelet-client-key` flags
5959
* see the [apiserver authentication documentation](/docs/reference/access-authn-authz/authentication/#x509-client-certs) for more details
6060
-->
6161
*`--client-ca-file` 标志启动 kubelet,提供一个 CA 证书包以供验证客户端证书
62-
*`--kubelet-client-certificate``--kubelet-client-key` 标志启动 apiserver
62+
*`--kubelet-client-certificate``--kubelet-client-key` 标志启动 API 服务器
6363
* 有关更多详细信息,请参见
64-
[apiserver 身份验证文档](/zh/docs/reference/access-authn-authz/authentication/#x509-client-certs)
64+
[API 服务器身份验证文档](/zh-cn/docs/reference/access-authn-authz/authentication/#x509-client-certs)
6565

66-
<!--
66+
<!--
6767
To enable API bearer tokens (including service account tokens) to be used to authenticate to the kubelet's HTTPS endpoint:
6868
-->
6969
要启用 API 持有者令牌(包括服务帐户令牌)以对 kubelet 的 HTTPS 端点进行身份验证,请执行以下操作:
7070

71-
<!--
71+
<!--
7272
* ensure the `authentication.k8s.io/v1beta1` API group is enabled in the API server
73-
* start the kubelet with the `--authentication-token-webhook` and the `--kubeconfig` flags
73+
* start the kubelet with the `--authentication-token-webhook` and `--kubeconfig` flags
7474
* the kubelet calls the `TokenReview` API on the configured API server to determine user information from bearer tokens
7575
-->
7676
* 确保在 API 服务器中启用了 `authentication.k8s.io/v1beta1` API 组
7777
*`--authentication-token-webhook``--kubeconfig` 标志启动 kubelet
7878
* kubelet 调用已配置的 API 服务器上的 `TokenReview` API,以根据持有者令牌确定用户信息
7979

80-
<!--
81-
## Kubelet authorization
80+
<!--
81+
## Kubelet authorization
8282
-->
83-
## Kubelet 鉴权
83+
## Kubelet 鉴权 {#kubelet-authorization}
8484

85-
<!--
85+
<!--
8686
Any request that is successfully authenticated (including an anonymous request) is then authorized. The default authorization mode is `AlwaysAllow`, which allows all requests.
8787
-->
88-
任何成功通过身份验证的请求(包括匿名请求)之后都会被鉴权。
88+
任何成功通过身份验证的请求(包括匿名请求)之后都会被鉴权。
8989
默认的鉴权模式为 `AlwaysAllow`,它允许所有请求。
9090

91-
<!--
91+
<!--
9292
There are many possible reasons to subdivide access to the kubelet API:
9393
-->
9494
细分对 kubelet API 的访问权限可能有多种原因:
9595

96-
<!--
96+
<!--
9797
* anonymous auth is enabled, but anonymous users' ability to call the kubelet API should be limited
9898
* bearer token auth is enabled, but arbitrary API users' (like service accounts) ability to call the kubelet API should be limited
9999
* client certificate auth is enabled, but only some of the client certificates signed by the configured CA should be allowed to use the kubelet API
@@ -102,12 +102,12 @@ There are many possible reasons to subdivide access to the kubelet API:
102102
* 启用了持有者令牌认证,但应限制任意 API 用户(如服务帐户)调用 kubelet API 的能力
103103
* 启用了客户端证书身份验证,但仅应允许已配置的 CA 签名的某些客户端证书使用 kubelet API
104104

105-
<!--
105+
<!--
106106
To subdivide access to the kubelet API, delegate authorization to the API server:
107107
-->
108108
要细分对 kubelet API 的访问权限,请将鉴权委派给 API 服务器:
109109

110-
<!--
110+
<!--
111111
* ensure the `authorization.k8s.io/v1beta1` API group is enabled in the API server
112112
* start the kubelet with the `--authorization-mode=Webhook` and the `--kubeconfig` flags
113113
* the kubelet calls the `SubjectAccessReview` API on the configured API server to determine whether each request is authorized
@@ -117,19 +117,19 @@ To subdivide access to the kubelet API, delegate authorization to the API server
117117
* kubelet 调用已配置的 API 服务器上的 `SubjectAccessReview` API,
118118
以确定每个请求是否得到鉴权
119119

120-
<!--
120+
<!--
121121
The kubelet authorizes API requests using the same [request attributes](/docs/reference/access-authn-authz/authorization/#review-your-request-attributes) approach as the apiserver.
122122
-->
123-
kubelet 使用与 apiserver 相同的
124-
[请求属性](/zh/docs/reference/access-authn-authz/authorization/#review-your-request-attributes)
123+
kubelet 使用与 API 服务器相同的
124+
[请求属性](/zh-cn/docs/reference/access-authn-authz/authorization/#review-your-request-attributes)
125125
方法对 API 请求执行鉴权。
126126

127-
<!--
127+
<!--
128128
The verb is determined from the incoming request's HTTP verb:
129129
-->
130130
请求的动词根据传入请求的 HTTP 动词确定:
131131

132-
<!--
132+
<!--
133133
HTTP verb | request verb
134134
-->
135135
HTTP 动词 | 请求动词
@@ -140,34 +140,34 @@ PUT | update
140140
PATCH | patch
141141
DELETE | delete
142142

143-
<!--
143+
<!--
144144
The resource and subresource is determined from the incoming request's path:
145145
-->
146146
资源和子资源是根据传入请求的路径确定的:
147147

148148
<!--
149-
Kubelet API | resource | subresource
149+
Kubelet API | resource | subresource
150150
-->
151151
Kubelet API | 资源 | 子资源
152152
-------------|----------|------------
153153
/stats/\* | nodes | stats
154154
/metrics/\* | nodes | metrics
155155
/logs/\* | nodes | log
156156
/spec/\* | nodes | spec
157-
*其它所有* | nodes | proxy
157+
**其它所有** | nodes | proxy
158158

159-
<!--
159+
<!--
160160
The namespace and API group attributes are always an empty string, and
161161
the resource name is always the name of the kubelet's `Node` API object.
162162
-->
163163
名字空间和 API 组属性始终是空字符串,
164164
资源名称始终是 kubelet 的 `Node` API 对象的名称。
165165

166-
<!--
166+
<!--
167167
When running in this mode, ensure the user identified by the `--kubelet-client-certificate` and `--kubelet-client-key`
168168
flags passed to the apiserver is authorized for the following attributes:
169169
-->
170-
在此模式下运行时,请确保传递给 apiserver 的由 `--kubelet-client-certificate`
170+
在此模式下运行时,请确保传递给 API 服务器的由 `--kubelet-client-certificate`
171171
`--kubelet-client-key` 标志标识的用户具有以下属性的鉴权:
172172

173173
* verb=\*, resource=nodes, subresource=proxy

0 commit comments

Comments
 (0)