@@ -208,7 +208,6 @@ Kubelet API | resource | subresource
208208/stats/\* | nodes | stats
209209/metrics/\* | nodes | metrics
210210/logs/\* | nodes | log
211- /spec/\* | nodes | spec
212211/pods | nodes | pods, proxy
213212/runningPods/ | nodes | pods, proxy
214213/healthz | nodes | healthz, proxy
@@ -220,7 +219,6 @@ kubelet API | 资源 | 子资源
220219/stats/\* | nodes | stats
221220/metrics/\* | nodes | metrics
222221/logs/\* | nodes | log
223- /spec/\* | nodes | spec
224222/pods | nodes | pods, proxy
225223/runningPods/ | nodes | pods, proxy
226224/healthz | nodes | healthz, proxy
@@ -238,8 +236,16 @@ flags passed to the API server is authorized for the following attributes:
238236* verb=\* , resource=nodes, subresource=proxy
239237* verb=\* , resource=nodes, subresource=stats
240238* verb=\* , resource=nodes, subresource=log
241- * verb=\* , resource=nodes, subresource=spec
242239* verb=\* , resource=nodes, subresource=metrics
243240* verb=\* , resource=nodes, subresource=configz
244241* verb=\* , resource=nodes, subresource=healthz
245242* verb=\* , resource=nodes, subresource=pods
243+
244+ <!--
245+ If [RBAC authorization](/docs/reference/access-authn-authz/rbac/) is used,
246+ enabling this gate also ensure that the builtin `system:kubelet-api-admin` ClusterRole
247+ is updated with permissions to access all the above mentioned subresources.
248+ -->
249+ 如果使用的是 [ RBAC 鉴权] ( /zh-cn/docs/reference/access-authn-authz/rbac/ ) ,
250+ 那么启用此特性门控时,系统还会自动更新内置的 ` system:kubelet-api-admin ClusterRole ` ,
251+ 确保其具备访问上述所有子资源的权限。
0 commit comments