You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh-cn/docs/tasks/extend-kubernetes/configure-aggregation-layer.md
+40-40Lines changed: 40 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,27 +18,26 @@ weight: 10
18
18
<!--
19
19
Configuring the [aggregation layer](/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/) allows the Kubernetes apiserver to be extended with additional APIs, which are not part of the core Kubernetes APIs.
Kubernetes apiserver 使用其它 API 扩展,这些 API 不是核心 Kubernetes API 的一部分。
24
23
25
24
## {{% heading "prerequisites" %}}
26
25
27
26
{{< include "task-tutorial-prereqs.md" >}} {{< version-check >}}
28
27
28
+
{{< note >}}
29
29
<!--
30
30
There are a few setup requirements for getting the aggregation layer working in your environment to support mutual TLS auth between the proxy and extension apiservers. Kubernetes and the kube-apiserver have multiple CAs, so make sure that the proxy is signed by the aggregation layer CA and not by something else, like the Kubernetes general CA.
Reusing the same CA for different client types can negatively impact the cluster's ability to function. For more information, see [CA Reusage and Conflicts](#ca-reusage-and-conflicts).
40
40
-->
41
-
{{< caution >}}
42
41
对不同的客户端类型重复使用相同的 CA 会对集群的功能产生负面影响。
43
42
有关更多信息,请参见 [CA 重用和冲突](#ca-reusage-and-conflicts)。
44
43
{{< /caution >}}
@@ -52,11 +51,11 @@ Unlike Custom Resource Definitions (CRDs), the Aggregation API involves another
52
51
53
52
This section describes how the authentication and authorization flows work, and how to configure them.
54
53
-->
55
-
## 身份认证流程
54
+
## 身份认证流程 {#authentication-flow}
56
55
57
56
与自定义资源定义(CRD)不同,除标准的 Kubernetes apiserver 外,Aggregation API
@@ -379,7 +380,7 @@ The extension apiserver, upon receiving a proxied request from the Kubernetes ap
379
380
380
381
* 由其证书与检索到的 CA 证书匹配的 CA 签名。
381
382
* 在允许的 CN 列表中有一个 CN,除非列表为空,在这种情况下允许所有 CN。
382
-
* 从适当的头部中提取用户名和组
383
+
* 从适当的头部中提取用户名和组。
383
384
384
385
<!--
385
386
If the above passes, then the request is a valid proxied request from a legitimate authenticating proxy, in this case the Kubernetes apiserver.
@@ -406,7 +407,7 @@ The extension apiserver now can validate that the user/group retrieved from the
406
407
407
408
In order for the extension apiserver to be authorized itself to submit the `SubjectAccessReview` request to the Kubernetes apiserver, it needs the correct permissions. Kubernetes includes a default `ClusterRole` named `system:auth-delegator` that has the appropriate permissions. It can be granted to the extension apiserver's service account.
@@ -485,7 +486,7 @@ If _both_ `--client-ca-file` and `--requestheader-client-ca-file` are provided,
485
486
For this reason, use different CA certs for the `--client-ca-file` option - to authorize control plane components and end-users - and the `--requestheader-client-ca-file` option - to authorize aggregation apiserver requests.
0 commit comments