Merge pull request #34341 from Sea-n/zh-psp-redirect

[zh] Fix link for PSP
pull/34358/head
Kubernetes Prow Robot 2022-06-17 02:12:31 -07:00 committed by GitHub
commit 1575e1e208
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 15 additions and 14 deletions

View File

@ -215,7 +215,7 @@ You can also use the deprecated [PodSecurityPolicy](/docs/concepts/policy/pod-se
to restrict users' abilities to create privileged Pods (N.B. PodSecurityPolicy is scheduled for removal
in version 1.25).
-->
你还可以使用已弃用的 [PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/)
你还可以使用已弃用的 [PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/)
机制以限制用户创建特权 Pod 的能力 特别注意PodSecurityPolicy 已计划在版本 1.25 中删除)。
<!--
@ -235,7 +235,7 @@ PersistentVolumes, and constrained users should use PersistentVolumeClaims to ac
-->
### 持久卷的创建 {#persistent-volume-creation}
如 [PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems)
如 [PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/#volumes-and-file-systems)
文档中所述,创建 PersistentVolumes 的权限可以提权访问底层主机。
如果需要访问 PersistentVolume受信任的管理员应该创建 `PersistentVolume`
受约束的用户应该使用 `PersistentVolumeClaim` 访问该存储。

View File

@ -26,7 +26,7 @@ This page describes security considerations and best practices specific to the W
<!--
## Protection for Secret data on nodes
-->
## 保护节点上的 Secret 数据
## 保护节点上的 Secret 数据 {#protection-for-secret-data-on-nodes}
<!--
On Windows, data from Secrets are written out in clear text onto the node's local
@ -48,7 +48,7 @@ operator, you should take both of the following additional measures:
<!--
## Container users
-->
## 容器用户
## 容器用户 {#container-users}
<!--
[RunAsUsername](/docs/tasks/configure-pod-container/configure-runasusername)
@ -57,7 +57,7 @@ processes as specific user. This is roughly equivalent to
[RunAsUser](/docs/concepts/policy/pod-security-policy/#users-and-groups).
-->
可以为 Windows Pod 或容器指定 [RunAsUsername](/zh/docs/tasks/configure-pod-container/configure-runasusername)
以作为特定用户执行容器进程。这大致相当于 [RunAsUser](/zh/docs/concepts/policy/pod-security-policy/#users-and-groups)。
以作为特定用户执行容器进程。这大致相当于 [RunAsUser](/zh-cn/docs/concepts/security/pod-security-policy/#users-and-groups)。
<!--
Windows containers offer two default user accounts, ContainerUser and ContainerAdministrator.
@ -92,7 +92,7 @@ Active Directory 身份运行。
<!--
## Pod-level security isolation
-->
## Pod 级安全隔离
## Pod 级安全隔离 {#pod-level-security-isolation}
<!--
Linux-specific pod security context mechanisms (such as SELinux, AppArmor, Seccomp, or custom

View File

@ -268,7 +268,7 @@ to the metadata API, and avoid using provisioning data to deliver secrets.
-->
### 限制云元数据 API 访问
云平台AWS, Azure, GCE 等)经常将 metadata 本地服务暴露给实例。
云平台AWS、Azure、GCE 等)经常将 metadata 本地服务暴露给实例。
默认情况下,这些 API 可由运行在实例上的 Pod 访问,并且可以包含
该云节点的凭据或配置数据(如 kubelet 凭据)。
这些凭据可以用于在集群内升级或在同一账户下升级到其他云服务。
@ -413,7 +413,7 @@ or run with elevated permissions if those service accounts are granted access to
如果执行 Pod 创建操作的组件能够在 `kube-system` 这类名字空间中创建 Pod
则这类组件也可能获得意外的权限,因为这些 Pod 可以访问服务账户的 Secret
或者,如果对应服务帐户被授权访问宽松的
[PodSecurityPolicy](/zh/docs/concepts/policy/pod-security-policy/)
[PodSecurityPolicy](/zh-cn/docs/concepts/security/pod-security-policy/)
它们就能以较高的权限运行。
<!--

View File

@ -31,7 +31,7 @@ admission controller. This can be done effectively using a combination of dry-ru
<!--
- Ensure the `PodSecurity` [feature gate](/docs/reference/command-line-tools-reference/feature-gates/#feature-gates-for-alpha-or-beta-features) is enabled.
-->
- 确保 `PodSecurity` [特性门控](/docs/reference/command-line-tools-reference/feature-gates/)被启用。
- 确保 `PodSecurity` [特性门控](/zh-cn/docs/reference/command-line-tools-reference/feature-gates/)被启用。
<!--
This page assumes you are already familiar with the basic [Pod Security Admission](/docs/concepts/security/pod-security-admission/)
@ -639,7 +639,7 @@ controller plugins:
-->
如果需要验证 PodSecurityPolicy 准入控制器不再被启用,你可以通过扮演某个无法访问任何
PodSecurityPolicy 的用户来执行测试(参见
[PodSecurityPolicy 示例](/zh/docs/concepts/policy/pod-security-policy/#example)
[PodSecurityPolicy 示例](/zh-cn/docs/concepts/security/pod-security-policy/#example)
或者通过检查 API 服务器的日志来进行验证。在启动期间API
服务器会输出日志行,列举所挂载的准入控制器插件。

View File

@ -162,6 +162,7 @@
/docs/concepts/policy/pod-security-policy/ /docs/concepts/security/pod-security-policy/ 301
/docs/consumer-guideline/pod-security-coverage/ /docs/concepts/security/pod-security-policy/ 301
/zh-cn/docs/concepts/policy/pod-security-policy/ /zh-cn/docs/concepts/security/pod-security-policy/ 301
/docs/contribute/create-pull-request/ /docs/home/contribute/create-pull-request/ 301
/docs/contribute/page-templates/ /docs/home/contribute/page-templates/ 301