@@ -39,8 +39,7 @@ finally being signed.
39
39
40
40
### Request signing process
41
41
42
- The [ CertificateSigningRequest] ( /docs/reference/kubernetes-api/authentication-resources/certificate-signing-request-v1/ )
43
- resource type allows a client to ask for an X.509 certificate
42
+ The CertificateSigningRequest resource type allows a client to ask for an X.509 certificate
44
43
be issued, based on a signing request.
45
44
The CertificateSigningRequest object includes a PEM-encoded PKCS #10 signing request in
46
45
the ` spec.request ` field. The CertificateSigningRequest denotes the signer (the
@@ -287,8 +286,7 @@ Non-PEM content may appear before or after the CERTIFICATE PEM blocks and is unv
287
286
to allow for explanatory text as described in [ section 5.2 of RFC7468] ( https://www.rfc-editor.org/rfc/rfc7468#section-5.2 ) .
288
287
289
288
When encoded in JSON or YAML, this field is base-64 encoded.
290
- A [ CertificateSigningRequest] ( /docs/reference/kubernetes-api/authentication-resources/certificate-signing-request-v1/ )
291
- containing the example certificate above would look like this:
289
+ A CertificateSigningRequest containing the example certificate above would look like this:
292
290
293
291
``` yaml
294
292
apiVersion : certificates.k8s.io/v1
@@ -510,7 +508,7 @@ openssl req -new -key myuser.key -out myuser.csr -subj "/CN=myuser"
510
508
511
509
Create a [CertificateSigningRequest](/docs/reference/kubernetes-api/authentication-resources/certificate-signing-request-v1/)
512
510
and submit it to a Kubernetes Cluster via kubectl. Below is a script to generate the
513
- [ CertificateSigningRequest](/docs/reference/kubernetes-api/authentication-resources/certificate-signing-request-v1/) .
511
+ CertificateSigningRequest.
514
512
515
513
` ` ` shell
516
514
cat <<EOF | kubectl apply -f -
0 commit comments