Skip to content

Commit be5f7ba

Browse files
authored
Merge pull request #34240 from howieyuen/zh-34221-reference-1
[zh]Resync reference files after zh language renaming(reference-1)
2 parents 9e1a873 + c93692e commit be5f7ba

File tree

6 files changed

+55
-9
lines changed

6 files changed

+55
-9
lines changed

content/zh-cn/docs/reference/access-authn-authz/_index.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ Reference documentation:
3737
- Service accounts
3838
- [Developer guide](/docs/tasks/configure-pod-container/configure-service-account/)
3939
- [Administration](/docs/reference/access-authn-authz/service-accounts-admin/)
40+
- [Kubelet Authentication & Authorization](/docs/reference/access-authn-authz/kubelet-authn-authz/)
41+
- including kubelet [TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)
4042
-->
4143
- [身份认证](/zh/docs/reference/access-authn-authz/authentication/)
4244
- [使用启动引导令牌来执行身份认证](/zh/docs/reference/access-authn-authz/bootstrap-tokens/)
@@ -53,4 +55,5 @@ Reference documentation:
5355
- 服务账号
5456
- [开发者指南](/zh/docs/tasks/configure-pod-container/configure-service-account/)
5557
- [管理文档](/zh/docs/reference/access-authn-authz/service-accounts-admin/)
56-
58+
- [Kubelet 认证和鉴权](/zh/docs/reference/access-authn-authz/kubelet-authn-authz/)
59+
- 包括 kubelet [TLS 启动引导](/zh/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)

content/zh-cn/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@ information on the permissions required to perform different actions on Certific
246246
有关对 CertificateSigningRequest 资源执行不同操作所需权限的详细信息,
247247
请参阅[证书签名请求](/zh/docs/reference/access-authn-authz/certificate-signing-requests/)
248248

249-
### CertificateSubjectRestrictions {#certificatesubjectrestrictions}
249+
### CertificateSubjectRestriction {#certificatesubjectrestriction}
250250

251251
<!--
252252
This admission controller observes creation of CertificateSigningRequest resources that have a `spec.signerName`

content/zh-cn/docs/reference/kubectl/cheatsheet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -542,7 +542,7 @@ kubectl patch deployment valid-deployment --type json -p='[{"op": "remove", "
542542
# Add a new element to a positional array
543543
kubectl patch sa default --type='json' -p='[{"op": "add", "path": "/secrets/1", "value": {"name": "whatever" } }]'
544544
545-
# Update a deployment's replicas count by patching it's scale subresource
545+
# Update a deployment's replica count by patching it's scale subresource
546546
kubectl patch deployment nginx-deployment --subresource='scale' --type='merge' -p '{"spec":{"replicas":2}}'
547547
```
548548
-->

content/zh-cn/docs/reference/labels-annotations-taints/_index.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -668,6 +668,44 @@ Kubernetes uses this label to differentiate multiple Services. Used currently fo
668668

669669
Kubernetes 使用这个标签来区分多个服务。目前仅用于 `ELB` (弹性负载均衡器)。
670670

671+
<!--
672+
### kubernetes.io/service-account.name
673+
674+
Example: `kubernetes.io/service-account.name: "sa-name"`
675+
676+
Used on: Secret
677+
678+
This annotation records the {{< glossary_tooltip term_id="name" text="name">}} of the
679+
ServiceAccount that the token (stored in the Secret of type `kubernetes.io/service-account-token`) represents.
680+
-->
681+
### kubernetes.io/service-account.name
682+
683+
示例:`kubernetes.io/service-account.name: "sa-name"`
684+
685+
用于:Secret
686+
687+
这个注解记录了令牌(存储在 `kubernetes.io/service-account-token` 类型的 Secret 中)所代表的
688+
ServiceAccount 的{{<glossary_tooltip term_id="name" text="名称">}}。
689+
690+
<!--
691+
### kubernetes.io/service-account.uid
692+
693+
Example: `kubernetes.io/service-account.uid: da68f9c6-9d26-11e7-b84e-002dc52800da`
694+
695+
Used on: Secret
696+
697+
This annotation records the {{< glossary_tooltip term_id="uid" text="unique ID" >}} of the
698+
ServiceAccount that the token (stored in the Secret of type `kubernetes.io/service-account-token`) represents.
699+
-->
700+
### kubernetes.io/service-account.uid
701+
702+
示例:`kubernetes.io/service-account.uid: da68f9c6-9d26-11e7-b84e-002dc52800da`
703+
704+
用于:Secret
705+
706+
该注解记录了令牌(存储在 `kubernetes.io/service-account-token` 类型的 Secret 中)所代表的
707+
ServiceAccount 的{{<glossary_tooltip term_id="uid" text="唯一 ID" >}}。
708+
671709
<!--
672710
### endpointslice.kubernetes.io/managed-by {#endpointslicekubernetesiomanaged-by}
673711

content/zh-cn/docs/reference/using-api/deprecation-guide.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -221,14 +221,17 @@ The **policy/v1beta1** API version of PodDisruptionBudget will no longer be serv
221221
<!--
222222
PodSecurityPolicy in the **policy/v1beta1** API version will no longer be served in v1.25, and the PodSecurityPolicy admission controller will be removed.
223223
224-
PodSecurityPolicy replacements are still under discussion, but current use can be migrated to
225-
[3rd-party admission webhooks](/docs/reference/access-authn-authz/extensible-admission-controllers/) now.
224+
Migrate to [Pod Security Admission](/docs/concepts/security/pod-security-admission/)
225+
or a [3rd party admission webhook](/docs/reference/access-authn-authz/extensible-admission-controllers/).
226+
For a migration guide, see [Migrate from PodSecurityPolicy to the Built-In PodSecurity Admission Controller](/docs/tasks/configure-pod-container/migrate-from-psp/).
227+
For more information on the deprecation, see [PodSecurityPolicy Deprecation: Past, Present, and Future](/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future/).
226228
-->
227229
**policy/v1beta1** API 版本中的 PodSecurityPolicy 将不会在 v1.25 中提供,
228230
并且 PodSecurityPolicy 准入控制器也会被删除。
229231

230-
PodSecurityPolicy 的替换方案仍在讨论过程中,不过当前的用法可以迁移到
231-
[第三方准入性质的 Webhook](/zh/docs/reference/access-authn-authz/extensible-admission-controllers/)
232+
迁移到 [Pod 安全准入](/zh/docs/concepts/security/pod-security-admission/)[第三方准入 webhook](/zh/docs/reference/access-authn-authz/extensible-admission-controllers/)
233+
有关迁移指南,请参阅[从 PodSecurityPolicy 迁移到内置 PodSecurity 准入控制器](/zh/docs/tasks/configure-pod-container/migrate-from-psp/)
234+
有关弃用的更多信息,请参阅 [PodSecurityPolicy 弃用:过去、现在和未来](/zh/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future/)
232235

233236
#### RuntimeClass {#runtimeclass-v125}
234237

content/zh-cn/docs/reference/using-api/server-side-apply.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,8 @@ this occurs, the applier has 3 options to resolve the conflicts:
220220
<!--
221221
* **Overwrite value, become sole manager:** If overwriting the value was
222222
intentional (or if the applier is an automated process like a controller) the
223-
applier should set the `force` query parameter to true and make the request
223+
applier should set the `force` query parameter to true (in kubectl, it can be done by
224+
using the `--force-conflicts` flag with the apply command) and make the request
224225
again. This forces the operation to succeed, changes the value of the field,
225226
and removes the field from all other managers' entries in managedFields.
226227

@@ -237,7 +238,8 @@ this occurs, the applier has 3 options to resolve the conflicts:
237238
field managers that already claimed to manage it.
238239
-->
239240
* **覆盖前值,成为唯一的管理器:** 如果打算覆盖该值(或应用者是一个自动化部件,比如控制器),
240-
应用者应该设置查询参数 `force` 为 true,然后再发送一次请求。
241+
应用者应该设置查询参数 `force` 为 true(在 kubectl 中,可以通过在
242+
apply 命令中使用 `--force-conflicts` 标志来完成),然后再发送一次请求。
241243
这将强制操作成功,改变字段的值,从所有其他管理器的 managedFields 条目中删除指定字段。
242244

243245
* **不覆盖前值,放弃管理权:** 如果应用者不再关注该字段的值,

0 commit comments

Comments
 (0)