Skip to content

Commit ec6b531

Browse files
authored
Merge pull request #28021 from CaoDonghui123/fix2
[zh]Resync tasks files[7]
2 parents 43de768 + ef49d66 commit ec6b531

File tree

4 files changed

+28
-19
lines changed

4 files changed

+28
-19
lines changed

content/zh/docs/tasks/configure-pod-container/configure-gmsa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ If you add the `lifecycle` section show above to your Pod spec, the Pod will exe
479479

480480
<!--
481481
## GMSA limitations
482-
When using the [ContainerD runtime for Windows](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#cri-containerd) accessing restricted network shares via the GMSA domain identity fails. The container will recieve the identity of and calls from `nltest.exe /query` will work. It is recommended to use the [Docker EE runtime](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#docker-ee) if access to network shares is required. The Windows Server team is working on resolving the issue in the Windows Kernel and will release a patch to resolve this issue in the future. Look for updates on the [Microsoft Windows Containers issue tracker](https://github.com/microsoft/Windows-Containers/issues/44).
482+
When using the [ContainerD runtime for Windows](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#cri-containerd) accessing restricted network shares via the GMSA domain identity fails. The container will receive the identity of and calls from `nltest.exe /query` will work. It is recommended to use the [Docker EE runtime](/docs/setup/production-environment/windows/intro-windows-in-kubernetes/#docker-ee) if access to network shares is required. The Windows Server team is working on resolving the issue in the Windows Kernel and will release a patch to resolve this issue in the future. Look for updates on the [Microsoft Windows Containers issue tracker](https://github.com/microsoft/Windows-Containers/issues/44).
483483
-->
484484
## GMSA 的局限 {#gmsa-limitations}
485485

content/zh/docs/tasks/configure-pod-container/configure-pod-configmap.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -293,8 +293,17 @@ how.nice.to.look=fairlyNice
293293
```
294294

295295
<!--
296+
When `kubectl` creates a ConfigMap from inputs that are not ASCII or UTF-8, the tool puts these into the `binaryData` field of the ConfigMap, and not in `data`. Both text and binary data sources can be combined in one ConfigMap.
297+
If you want to view the `binaryData` keys (and their values) in a ConfigMap, you can run `kubectl get configmap -o jsonpath='{.binaryData}' <name>`.
298+
296299
Use the option `--from-env-file` to create a ConfigMap from an env-file, for example:
297300
-->
301+
当 `kubectl` 基于非 ASCII 或 UTF-8 的输入创建 ConfigMap 时,
302+
该工具将这些输入放入 ConfigMap 的 `binaryData` 字段,而不是 `data` 中。
303+
同一个 ConfigMap 中可同时包含文本数据和二进制数据源。
304+
如果你想查看 ConfigMap 中的 `binaryData` 键(及其值),
305+
你可以运行 `kubectl get configmap -o jsonpath='{.binaryData}' <name>`。
306+
298307
使用 `--from-env-file` 选项从环境文件创建 ConfigMap,例如:
299308

300309
<!--

content/zh/docs/tasks/configure-pod-container/configure-service-account.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -190,15 +190,15 @@ then you will see that a token has automatically been created and is referenced
190190
191191
You may use authorization plugins to [set permissions on service accounts](/docs/reference/access-authn-authz/rbac/#service-account-permissions).
192192
193-
To use a non-default service account, simply set the `spec.serviceAccountName`
193+
To use a non-default service account, set the `spec.serviceAccountName`
194194
field of a pod to the name of the service account you wish to use.
195195
-->
196196
那么你就能看到系统已经自动创建了一个令牌并且被服务账户所引用。
197197

198198
你可以使用授权插件来
199199
[设置服务账户的访问许可](/zh/docs/reference/access-authn-authz/rbac/#service-account-permissions)。
200200

201-
要使用非默认的服务账户,只需简单的将 Pod 的 `spec.serviceAccountName` 字段设置为你想用的服务账户名称。
201+
要使用非默认的服务账户, Pod 的 `spec.serviceAccountName` 字段设置为你想用的服务账户名称。
202202

203203
<!--
204204
The service account has to exist at the time the pod is created, or it will be rejected.
@@ -489,18 +489,15 @@ The application is responsible for reloading the token when it rotates. Periodic
489489
-->
490490
## 发现服务账号分发者
491491

492-
{{< feature-state for_k8s_version="v1.20" state="beta" >}}
492+
{{< feature-state for_k8s_version="v1.21" state="stable" >}}
493493

494494
<!--
495-
The Service Account Issuer Discovery feature is enabled by enabling the
496-
`ServiceAccountIssuerDiscovery` [feature gate](/docs/reference/command-line-tools-reference/feature-gates)
497-
and then enabling the Service Account Token Projection feature as described
495+
The Service Account Issuer Discovery feature is enabled when the Service Account
496+
Token Projection feature is enabled, as described
498497
[above](#service-account-token-volume-projection).
499498
-->
500-
通过启用 `ServiceAccountIssuerDiscovery`
501-
[特性门控](/zh/docs/reference/command-line-tools-reference/feature-gates)
502-
并按[前文所述](#service-account-token-volume-projection)启用服务账号令牌投射,
503-
可以启用发现服务账号分发者(Service Account Issuer Discovery)这一功能特性。
499+
当启用服务账号令牌投射时启用发现服务账号分发者(Service Account Issuer Discovery)这一功能特性,
500+
[上文所述](#service-account-token-volume-projection)
504501

505502
<!--
506503
The issuer URL must comply with the
@@ -542,14 +539,15 @@ JSON Web Key Set(JWKS)。
542539
这里的 OpenID 提供者配置有时候也被称作 _发现文档(Discovery Document)_
543540

544541
<!--
545-
When enabled, the cluster is also configured with a default RBAC ClusterRole
546-
called `system:service-account-issuer-discovery`. No role bindings are provided
542+
Clusters include a default RBAC ClusterRole called
543+
`system:service-account-issuer-discovery`. No role bindings are provided
547544
by default. Administrators may, for example, choose whether to bind the role to
548545
`system:authenticated` or `system:unauthenticated` depending on their security
549546
requirements and which external systems they intend to federate with.
550547
-->
551-
特性被启用时,集群也会配置名为 `system:service-account-issuer-discovery`
552-
的默认 RBAC ClusterRole,但默认情况下不提供角色绑定对象。
548+
集群包括一个默认的 RBAC ClusterRole,
549+
名为 `system:service-account-issuer-discovery`
550+
默认情况下不提供角色绑定对象。
553551
举例而言,管理员可以根据其安全性需要以及期望集成的外部系统选择是否将该角色绑定到
554552
`system:authenticated``system:unauthenticated`
555553

content/zh/docs/tasks/configure-pod-container/pull-image-private-registry.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,8 @@ kubectl create secret docker-registry regcred \
109109
<!--
110110
where:
111111
112-
* `<your-registry-server>` is your Private Docker Registry FQDN. (https://index.docker.io/v1/ for DockerHub)
112+
* `<your-registry-server>` is your Private Docker Registry FQDN.
113+
Use `https://index.docker.io/v2/` for DockerHub.
113114
* `<your-name>` is your Docker username.
114115
* `<your-pword>` is your Docker password.
115116
* `<your-email>` is your Docker email.
@@ -119,7 +120,7 @@ You have successfully set your Docker credentials in the cluster as a Secret cal
119120
在这里:
120121

121122
* `<your-registry-server>` 是你的私有 Docker 仓库全限定域名(FQDN)。
122-
(参考 https://index.docker.io/v1/ 中关于 DockerHub 的部分)
123+
DockerHub 使用 `https://index.docker.io/v2/`
123124
* `<your-name>` 是你的 Docker 用户名。
124125
* `<your-pword>` 是你的 Docker 密码。
125126
* `<your-email>` 是你的 Docker 邮箱。
@@ -129,7 +130,7 @@ You have successfully set your Docker credentials in the cluster as a Secret cal
129130
<!--
130131
## Inspecting the Secret `regcred`
131132
132-
To understand the contents of the `regcred` Secret you just created, start by viewing the Secret in YAML format:
133+
To understand the contents of the `regcred` Secret you created, start by viewing the Secret in YAML format:
133134
-->
134135
## 检查 Secret `regcred`
135136

@@ -231,7 +232,8 @@ janedoe/jdoe-private:v1
231232

232233
<!--
233234
To pull the image from the private registry, Kubernetes needs credentials.
234-
The `imagePullSecrets` field in the configuration file specifies that Kubernetes should get the credentials from a Secret named `regcred`.
235+
The `imagePullSecrets` field in the configuration file specifies that
236+
Kubernetes should get the credentials from a Secret named `regcred`.
235237

236238
Create a Pod that uses your Secret, and verify that the Pod is running:
237239
-->

0 commit comments

Comments
 (0)