You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh/docs/tasks/extend-kubernetes/configure-aggregation-layer.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ weight: 10
16
16
<!-- overview -->
17
17
18
18
<!--
19
-
Configuring the [aggregation layer](/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/) allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs.
19
+
Configuring the [aggregation layer](/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/) allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs.
Kubernetes apiserver 使用其它 API 扩展,这些 API 不是核心 Kubernetes API 的一部分。
@@ -26,7 +26,7 @@ Kubernetes apiserver 使用其它 API 扩展,这些 API 不是核心 Kubernete
26
26
{{< include "task-tutorial-prereqs.md" >}} {{< version-check >}}
27
27
28
28
<!--
29
-
There are a few setup requirements for getting the aggregation layer working in your environment to support mutual TLS auth between the proxy and extension apiservers. Kubernetes and the kube-apiserver have multiple CAs, so make sure that the proxy is signed by the aggregation layer CA and not by something else, like the master CA.
29
+
There are a few setup requirements for getting the aggregation layer working in your environment to support mutual TLS auth between the proxy and extension apiservers. Kubernetes and the kube-apiserver have multiple CAs, so make sure that the proxy is signed by the aggregation layer CA and not by something else, like the master CA.
@@ -283,7 +283,7 @@ When started with these options, the Kubernetes apiserver will:
283
283
1. Use them to authenticate to the extension apiserver.
284
284
2. Create a configmap in the `kube-system` namespace called `extension-apiserver-authentication`, in which it will place the CA certificate and the allowed CNs. These in turn can be retrieved by extension apiservers to validate requests.
285
285
286
-
Note that the same client certificate is used by the Kubernetes apiserver to authenticate against _all_ extension apiservers. It does not create a client certificate per extension apiserver, but rather a single one to authenticate as the Kubernetes apiserver. This same one is reused for all extension apiserver requests.
286
+
Note that the same client certificate is used by the Kubernetes apiserver to authenticate against _all_ extension apiservers. It does not create a client certificate per extension apiserver, but rather a single one to authenticate as the Kubernetes apiserver. This same one is reused for all extension apiserver requests.
287
287
-->
288
288
使用这些选项启动时,Kubernetes apiserver 将:
289
289
@@ -309,7 +309,7 @@ These header names are also placed in the `extension-apiserver-authentication` c
@@ -323,7 +323,7 @@ The extension apiserver, upon receiving a proxied request from the Kubernetes ap
323
323
* Client CA certificate
324
324
* List of allowed names (CNs)
325
325
* Header names for username, group and extra info
326
-
326
+
327
327
2. Check that the TLS connection was authenticated using a client certificate which:
328
328
* Was signed by the CA whose certificate matches the retrieved CA certificate.
329
329
* Has a CN in the list of allowed CNs, unless the list is blank, in which case all CNs are allowed.
@@ -337,7 +337,7 @@ The extension apiserver, upon receiving a proxied request from the Kubernetes ap
337
337
* 客户端 CA 证书
338
338
* 允许名称(CN)列表
339
339
* 用户名,组和其他信息的头部
340
-
340
+
341
341
2.使用以下证书检查 TLS 连接是否已通过认证:
342
342
* 由其证书与检索到的 CA 证书匹配的 CA 签名。
343
343
* 在允许的 CN 列表中有一个 CN,除非列表为空,在这种情况下允许所有 CN。
@@ -359,7 +359,7 @@ In order to have permission to retrieve the configmap, an extension apiserver re
359
359
<!--
360
360
### Extension Apiserver Authorizes the Request
361
361
362
-
The extension apiserver now can validate that the user/group retrieved from the headers are authorized to execute the given request. It does so by sending a standard [SubjectAccessReview](/docs/reference/access-authn-authz/authorization/) request to the Kubernetes apiserver.
362
+
The extension apiserver now can validate that the user/group retrieved from the headers are authorized to execute the given request. It does so by sending a standard [SubjectAccessReview](/docs/reference/access-authn-authz/authorization/) request to the Kubernetes apiserver.
363
363
364
364
In order for the extension apiserver to be authorized itself to submit the `SubjectAccessReview` request to the Kubernetes apiserver, it needs the correct permissions. Kubernetes includes a default `ClusterRole` named `system:auth-delegator` that has the appropriate permissions. It can be granted to the extension apiserver's service account.
365
365
-->
@@ -504,7 +504,7 @@ at the subpath "/my-path", and to verify the TLS connection against the ServerNa
0 commit comments