You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Custom signerNames can also be specified. All signers should provide information about how they work
140
-
so that clients can predict what will happen to their CSRs.
130
+
Custom signerNames can also be specified. All signers should provide information about how they work so that clients can predict what will happen to their CSRs.
141
131
This includes:
142
132
-->
143
133
## 签名者 {#signers}
@@ -149,27 +139,22 @@ This includes:
149
139
150
140
<!--
151
141
1. **Trust distribution**: how trust (CA bundles) are distributed.
152
-
2. **Permitted subjects**: any restrictions on and behavior
153
-
when a disallowed subject is requested.
154
-
3. **Permitted x509 extensions**: including IP subjectAltNames, DNS subjectAltNames,
155
-
Email subjectAltNames, URI subjectAltNames etc,
156
-
and behavior when a disallowed extension is requested.
157
-
4. **Permitted key usages / extended key usages**: any restrictions on and behavior
158
-
when usages different than the signer-determined usages are specified in the CSR.
159
-
5. **Expiration/certificate lifetime**: whether it is fixed by the signer, configurable by the admin, determined by the CSR `spec.expirationSeconds` field, etc
142
+
1. **Permitted subjects**: any restrictions on and behavior when a disallowed subject is requested.
143
+
1. **Permitted x509 extensions**: including IP subjectAltNames, DNS subjectAltNames, Email subjectAltNames, URI subjectAltNames etc, and behavior when a disallowed extension is requested.
144
+
1. **Permitted key usages / extended key usages**: any restrictions on and behavior when usages different than the signer-determined usages are specified in the CSR.
145
+
1. **Expiration/certificate lifetime**: whether it is fixed by the signer, configurable by the admin, determined by the CSR `spec.expirationSeconds` field, etc
160
146
and the behavior when the signer-determined expiration is different from the CSR `spec.expirationSeconds` field.
161
-
6. **CA bit allowed/disallowed**: and behavior if a CSR contains a request
162
-
a for a CA certificate when the signer does not permit it.
147
+
1. **CA bit allowed/disallowed**: and behavior if a CSR contains a request a for a CA certificate when the signer does not permit it.
163
148
-->
164
149
1.**信任分发**:信任(CA 证书包)是如何分发的。
165
-
2.**许可的主体**:当一个受限制的主体(subject)发送请求时,相应的限制和应对手段。
166
-
3.**许可的 x509 扩展**:包括 IP subjectAltNames、DNS subjectAltNames、
150
+
1.**许可的主体**:当一个受限制的主体(subject)发送请求时,相应的限制和应对手段。
151
+
1.**许可的 x509 扩展**:包括 IP subjectAltNames、DNS subjectAltNames、
6.**允许/不允许 CA 位**:当 CSR 包含一个签名者并不允许的 CA 证书的请求时,相应的应对手段。
157
+
1.**允许/不允许 CA 位**:当 CSR 包含一个签名者并不允许的 CA 证书的请求时,相应的应对手段。
173
158
174
159
<!--
175
160
Commonly, the `status.certificate` field contains a single PEM-encoded X.509
@@ -218,22 +203,22 @@ Kubernetes provides built-in signers that each have a well-known `signerName`:
218
203
-->
219
204
### Kubernetes 签名者 {#kubernetes-signers}
220
205
221
-
Kubernetes提供了内置的签名者,每个签名者都有一个众所周知的 `signerName`:
206
+
Kubernetes 提供了内置的签名者,每个签名者都有一个众所周知的 `signerName`:
222
207
223
208
<!--
224
209
1. `kubernetes.io/kube-apiserver-client`: signs certificates that will be honored as client certificates by the API server.
225
-
Never auto-approved by {{< glossary_tooltip term_id="kube-controller-manager" >}}.
226
-
1. Trust distribution: signed certificates must be honored as client-certificates by the kube-apiserver. The CA bundle is not distributed by any other means.
227
-
1. Permitted subjects - no subject restrictions, but approvers and signers may choose not to approve or sign.
228
-
Certain subjects like cluster-admin level users or groups vary between distributions and installations,
229
-
but deserve additional scrutiny before approval and signing.
230
-
The `CertificateSubjectRestriction` admission plugin is enabled by default to restrict `system:masters`,
231
-
but it is often not the only cluster-admin subject in a cluster.
232
-
1. Permitted x509 extensions - honors subjectAltName and key usage extensions and discards other extensions.
233
-
1. Permitted key usages - must include `["client auth"]`. Must not include key usages beyond `["digital signature", "key encipherment", "client auth"]`.
234
-
1. Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
235
-
of the `--cluster-signing-duration` option or, if specified, the `spec.expirationSeconds` field of the CSR object.
236
-
1. CA bit allowed/disallowed - not allowed.
210
+
Never auto-approved by {{< glossary_tooltip term_id="kube-controller-manager" >}}.
211
+
1. Trust distribution: signed certificates must be honored as clientcertificates by the API server. The CA bundle is not distributed by any other means.
212
+
1. Permitted subjects - no subject restrictions, but approvers and signers may choose not to approve or sign.
213
+
Certain subjects like cluster-admin level users or groups vary between distributions and installations,
214
+
but deserve additional scrutiny before approval and signing.
215
+
The `CertificateSubjectRestriction` admission plugin is enabled by default to restrict `system:masters`,
216
+
but it is often not the only cluster-admin subject in a cluster.
217
+
1. Permitted x509 extensions - honors subjectAltName and key usage extensions and discards other extensions.
218
+
1. Permitted key usages - must include `["client auth"]`. Must not include key usages beyond `["digital signature", "key encipherment", "client auth"]`.
219
+
1. Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
220
+
of the `--cluster-signing-duration` option or, if specified, the `spec.expirationSeconds` field of the CSR object.
221
+
1. CA bit allowed/disallowed - not allowed.
237
222
-->
238
223
1.`kubernetes.io/kube-apiserver-client`:签名的证书将被 API 服务器视为客户证书。
1. `kubernetes.io/kubelet-serving`: signs serving certificates that are honored as a valid kubelet serving certificate
279
264
by the API server, but has no other guarantees.
280
265
Never auto-approved by {{< glossary_tooltip term_id="kube-controller-manager" >}}.
281
-
1. Trust distribution: signed certificates must be honored by the kube-apiserver as valid to terminate connections to a kubelet. The CA bundle is not distributed by any other means.
266
+
1. Trust distribution: signed certificates must be honored by the API server as valid to terminate connections to a kubelet.
267
+
The CA bundle is not distributed by any other means.
282
268
1. Permitted subjects - organizations are exactly `["system:nodes"]`, common name starts with "`system:node:`".
283
269
1. Permitted x509 extensions - honors key usage and DNSName/IPAddress subjectAltName extensions, forbids EmailAddress and
284
270
URI subjectAltName extensions, drops other extensions. At least one DNS or IP subjectAltName must be present.
0 commit comments