mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	Merge pull request #34019 from deads2k/rbac-12-default-bindings
Automatic merge from submit-queue Add default cluster role bindings Add default cluster roles bindings to rbac bootstrapping. Also adds a case for allowing escalation when you have no authenticator. @liggitt I expect you may need to make peace with this.
This commit is contained in:
		@@ -419,6 +419,10 @@ runTests() {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
  kubectl get "${kube_flags[@]}" --raw /version
 | 
					  kubectl get "${kube_flags[@]}" --raw /version
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # make sure the server was properly bootstrapped with clusterroles and bindings
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterroles/cluster-admin "{{.metadata.name}}" 'cluster-admin'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebindings/cluster-admin "{{.metadata.name}}" 'cluster-admin'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  ###########################
 | 
					  ###########################
 | 
				
			||||||
  # POD creation / deletion #
 | 
					  # POD creation / deletion #
 | 
				
			||||||
  ###########################
 | 
					  ###########################
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,6 +20,7 @@ import (
 | 
				
			|||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"k8s.io/kubernetes/pkg/api"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/api/unversioned"
 | 
						"k8s.io/kubernetes/pkg/api/unversioned"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -162,3 +163,61 @@ func (r *PolicyRuleBuilder) Rule() (PolicyRule, error) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	return r.PolicyRule, nil
 | 
						return r.PolicyRule, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// +k8s:deepcopy-gen=false
 | 
				
			||||||
 | 
					// ClusterRoleBindingBuilder let's us attach methods.  A no-no for API types.
 | 
				
			||||||
 | 
					// We use it to construct bindings in code.  It's more compact than trying to write them
 | 
				
			||||||
 | 
					// out in a literal.
 | 
				
			||||||
 | 
					type ClusterRoleBindingBuilder struct {
 | 
				
			||||||
 | 
						ClusterRoleBinding ClusterRoleBinding
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func NewClusterBinding(clusterRoleName string) *ClusterRoleBindingBuilder {
 | 
				
			||||||
 | 
						return &ClusterRoleBindingBuilder{
 | 
				
			||||||
 | 
							ClusterRoleBinding: ClusterRoleBinding{
 | 
				
			||||||
 | 
								ObjectMeta: api.ObjectMeta{Name: clusterRoleName},
 | 
				
			||||||
 | 
								RoleRef: RoleRef{
 | 
				
			||||||
 | 
									APIGroup: GroupName,
 | 
				
			||||||
 | 
									Kind:     "ClusterRole",
 | 
				
			||||||
 | 
									Name:     clusterRoleName,
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (r *ClusterRoleBindingBuilder) Groups(groups ...string) *ClusterRoleBindingBuilder {
 | 
				
			||||||
 | 
						for _, group := range groups {
 | 
				
			||||||
 | 
							r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, Subject{Kind: GroupKind, Name: group})
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return r
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (r *ClusterRoleBindingBuilder) Users(users ...string) *ClusterRoleBindingBuilder {
 | 
				
			||||||
 | 
						for _, user := range users {
 | 
				
			||||||
 | 
							r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, Subject{Kind: UserKind, Name: user})
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return r
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (r *ClusterRoleBindingBuilder) SAs(namespace string, serviceAccountNames ...string) *ClusterRoleBindingBuilder {
 | 
				
			||||||
 | 
						for _, saName := range serviceAccountNames {
 | 
				
			||||||
 | 
							r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, Subject{Kind: ServiceAccountKind, Namespace: namespace, Name: saName})
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return r
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (r *ClusterRoleBindingBuilder) BindingOrDie() ClusterRoleBinding {
 | 
				
			||||||
 | 
						ret, err := r.Binding()
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							panic(err)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return ret
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func (r *ClusterRoleBindingBuilder) Binding() (ClusterRoleBinding, error) {
 | 
				
			||||||
 | 
						if len(r.ClusterRoleBinding.Subjects) == 0 {
 | 
				
			||||||
 | 
							return ClusterRoleBinding{}, fmt.Errorf("subjects are required: %#v", r.ClusterRoleBinding)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return r.ClusterRoleBinding, nil
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5004,6 +5004,23 @@ var OpenAPIDefinitions *common.OpenAPIDefinitions = &common.OpenAPIDefinitions{
 | 
				
			|||||||
		Dependencies: []string{
 | 
							Dependencies: []string{
 | 
				
			||||||
			"api.ObjectMeta", "rbac.RoleRef", "rbac.Subject", "unversioned.TypeMeta"},
 | 
								"api.ObjectMeta", "rbac.RoleRef", "rbac.Subject", "unversioned.TypeMeta"},
 | 
				
			||||||
	},
 | 
						},
 | 
				
			||||||
 | 
						"rbac.ClusterRoleBindingBuilder": {
 | 
				
			||||||
 | 
							Schema: spec.Schema{
 | 
				
			||||||
 | 
								SchemaProps: spec.SchemaProps{
 | 
				
			||||||
 | 
									Description: "ClusterRoleBindingBuilder let's us attach methods.  A no-no for API types. We use it to construct bindings in code.  It's more compact than trying to write them out in a literal.",
 | 
				
			||||||
 | 
									Properties: map[string]spec.Schema{
 | 
				
			||||||
 | 
										"ClusterRoleBinding": {
 | 
				
			||||||
 | 
											SchemaProps: spec.SchemaProps{
 | 
				
			||||||
 | 
												Ref: spec.MustCreateRef("#/definitions/rbac.ClusterRoleBinding"),
 | 
				
			||||||
 | 
											},
 | 
				
			||||||
 | 
										},
 | 
				
			||||||
 | 
									},
 | 
				
			||||||
 | 
									Required: []string{"ClusterRoleBinding"},
 | 
				
			||||||
 | 
								},
 | 
				
			||||||
 | 
							},
 | 
				
			||||||
 | 
							Dependencies: []string{
 | 
				
			||||||
 | 
								"rbac.ClusterRoleBinding"},
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
	"rbac.ClusterRoleBindingList": {
 | 
						"rbac.ClusterRoleBindingList": {
 | 
				
			||||||
		Schema: spec.Schema{
 | 
							Schema: spec.Schema{
 | 
				
			||||||
			SchemaProps: spec.SchemaProps{
 | 
								SchemaProps: spec.SchemaProps{
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"k8s.io/kubernetes/pkg/api/rest"
 | 
						"k8s.io/kubernetes/pkg/api/rest"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/auth/user"
 | 
						rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/runtime"
 | 
						"k8s.io/kubernetes/pkg/runtime"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -43,20 +43,10 @@ func NewStorage(s rest.StandardStorage, ruleResolver validation.AuthorizationRul
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
					func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
	if u, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && u.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Create(ctx, obj)
 | 
							return s.StandardStorage.Create(ctx, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// system:masters is special because the API server uses it for privileged loopback connections
 | 
					 | 
				
			||||||
		// therefore we know that a member of system:masters can always do anything
 | 
					 | 
				
			||||||
		for _, group := range u.GetGroups() {
 | 
					 | 
				
			||||||
			if group == user.SystemPrivilegedGroup {
 | 
					 | 
				
			||||||
				return s.StandardStorage.Create(ctx, obj)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	clusterRole := obj.(*rbac.ClusterRole)
 | 
						clusterRole := obj.(*rbac.ClusterRole)
 | 
				
			||||||
	rules := clusterRole.Rules
 | 
						rules := clusterRole.Rules
 | 
				
			||||||
	if err := validation.ConfirmNoEscalation(ctx, s.ruleResolver, rules); err != nil {
 | 
						if err := validation.ConfirmNoEscalation(ctx, s.ruleResolver, rules); err != nil {
 | 
				
			||||||
@@ -66,11 +56,9 @@ func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, e
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
					func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
				
			||||||
	if user, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && user.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Update(ctx, name, obj)
 | 
							return s.StandardStorage.Update(ctx, name, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
						nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
		clusterRole := obj.(*rbac.ClusterRole)
 | 
							clusterRole := obj.(*rbac.ClusterRole)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"k8s.io/kubernetes/pkg/api/rest"
 | 
						"k8s.io/kubernetes/pkg/api/rest"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/auth/user"
 | 
						rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/runtime"
 | 
						"k8s.io/kubernetes/pkg/runtime"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -43,20 +43,10 @@ func NewStorage(s rest.StandardStorage, ruleResolver validation.AuthorizationRul
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
					func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
	if u, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && u.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Create(ctx, obj)
 | 
							return s.StandardStorage.Create(ctx, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// system:masters is special because the API server uses it for privileged loopback connections
 | 
					 | 
				
			||||||
		// therefore we know that a member of system:masters can always do anything
 | 
					 | 
				
			||||||
		for _, group := range u.GetGroups() {
 | 
					 | 
				
			||||||
			if group == user.SystemPrivilegedGroup {
 | 
					 | 
				
			||||||
				return s.StandardStorage.Create(ctx, obj)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	clusterRoleBinding := obj.(*rbac.ClusterRoleBinding)
 | 
						clusterRoleBinding := obj.(*rbac.ClusterRoleBinding)
 | 
				
			||||||
	rules, err := s.ruleResolver.GetRoleReferenceRules(ctx, clusterRoleBinding.RoleRef, clusterRoleBinding.Namespace)
 | 
						rules, err := s.ruleResolver.GetRoleReferenceRules(ctx, clusterRoleBinding.RoleRef, clusterRoleBinding.Namespace)
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -69,11 +59,9 @@ func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, e
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
					func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
				
			||||||
	if user, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && user.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Update(ctx, name, obj)
 | 
							return s.StandardStorage.Update(ctx, name, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
						nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
		clusterRoleBinding := obj.(*rbac.ClusterRoleBinding)
 | 
							clusterRoleBinding := obj.(*rbac.ClusterRoleBinding)
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										45
									
								
								pkg/registry/rbac/escalation_check.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										45
									
								
								pkg/registry/rbac/escalation_check.go
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,45 @@
 | 
				
			|||||||
 | 
					/*
 | 
				
			||||||
 | 
					Copyright 2016 The Kubernetes Authors.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					You may obtain a copy of the License at
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					limitations under the License.
 | 
				
			||||||
 | 
					*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					package rbac
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					import (
 | 
				
			||||||
 | 
						"k8s.io/kubernetes/pkg/api"
 | 
				
			||||||
 | 
						"k8s.io/kubernetes/pkg/auth/user"
 | 
				
			||||||
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					func EscalationAllowed(ctx api.Context, superUser string) bool {
 | 
				
			||||||
 | 
						u, ok := api.UserFrom(ctx)
 | 
				
			||||||
 | 
						if !ok {
 | 
				
			||||||
 | 
							// the only way to be without a user is to either have no authenticators by explicitly saying that's your preference
 | 
				
			||||||
 | 
							// or to be connecting via the insecure port, in which case this logically doesn't apply
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// check to see if this subject is allowed to escalate
 | 
				
			||||||
 | 
						if len(superUser) != 0 && u.GetName() == superUser {
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						// system:masters is special because the API server uses it for privileged loopback connections
 | 
				
			||||||
 | 
						// therefore we know that a member of system:masters can always do anything
 | 
				
			||||||
 | 
						for _, group := range u.GetGroups() {
 | 
				
			||||||
 | 
							if group == user.SystemPrivilegedGroup {
 | 
				
			||||||
 | 
								return true
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return false
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
@@ -131,5 +131,25 @@ func PostStartHook(hookContext genericapiserver.PostStartHookContext) error {
 | 
				
			|||||||
		glog.Infof("Created clusterrole.%s/%s", rbac.GroupName, clusterRole.Name)
 | 
							glog.Infof("Created clusterrole.%s/%s", rbac.GroupName, clusterRole.Name)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						existingClusterRoleBindings, err := clientset.ClusterRoleBindings().List(api.ListOptions{})
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							utilruntime.HandleError(fmt.Errorf("unable to initialize clusterrolebindings: %v", err))
 | 
				
			||||||
 | 
							return nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						// if clusterrolebindings already exist, then assume we don't have work to do because we've already
 | 
				
			||||||
 | 
						// initialized or another API server has started this task
 | 
				
			||||||
 | 
						if len(existingClusterRoleBindings.Items) > 0 {
 | 
				
			||||||
 | 
							return nil
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for _, clusterRoleBinding := range append(bootstrappolicy.ClusterRoleBindings(), bootstrappolicy.ControllerRoleBindings()...) {
 | 
				
			||||||
 | 
							if _, err := clientset.ClusterRoleBindings().Create(&clusterRoleBinding); err != nil {
 | 
				
			||||||
 | 
								// don't fail on failures, try to create as many as you can
 | 
				
			||||||
 | 
								utilruntime.HandleError(fmt.Errorf("unable to initialize clusterrolebindings: %v", err))
 | 
				
			||||||
 | 
								continue
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							glog.Infof("Created clusterrolebinding.%s/%s", rbac.GroupName, clusterRoleBinding.Name)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return nil
 | 
						return nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"k8s.io/kubernetes/pkg/api/rest"
 | 
						"k8s.io/kubernetes/pkg/api/rest"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/auth/user"
 | 
						rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/runtime"
 | 
						"k8s.io/kubernetes/pkg/runtime"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -43,20 +43,10 @@ func NewStorage(s rest.StandardStorage, ruleResolver validation.AuthorizationRul
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
					func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
	if u, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && u.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Create(ctx, obj)
 | 
							return s.StandardStorage.Create(ctx, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// system:masters is special because the API server uses it for privileged loopback connections
 | 
					 | 
				
			||||||
		// therefore we know that a member of system:masters can always do anything
 | 
					 | 
				
			||||||
		for _, group := range u.GetGroups() {
 | 
					 | 
				
			||||||
			if group == user.SystemPrivilegedGroup {
 | 
					 | 
				
			||||||
				return s.StandardStorage.Create(ctx, obj)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	role := obj.(*rbac.Role)
 | 
						role := obj.(*rbac.Role)
 | 
				
			||||||
	rules := role.Rules
 | 
						rules := role.Rules
 | 
				
			||||||
	if err := validation.ConfirmNoEscalation(ctx, s.ruleResolver, rules); err != nil {
 | 
						if err := validation.ConfirmNoEscalation(ctx, s.ruleResolver, rules); err != nil {
 | 
				
			||||||
@@ -66,11 +56,9 @@ func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, e
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
					func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
				
			||||||
	if user, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && user.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Update(ctx, name, obj)
 | 
							return s.StandardStorage.Update(ctx, name, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
						nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
		role := obj.(*rbac.Role)
 | 
							role := obj.(*rbac.Role)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"k8s.io/kubernetes/pkg/api/rest"
 | 
						"k8s.io/kubernetes/pkg/api/rest"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
						"k8s.io/kubernetes/pkg/apis/rbac/validation"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/auth/user"
 | 
						rbacregistry "k8s.io/kubernetes/pkg/registry/rbac"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/runtime"
 | 
						"k8s.io/kubernetes/pkg/runtime"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -43,20 +43,10 @@ func NewStorage(s rest.StandardStorage, ruleResolver validation.AuthorizationRul
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
					func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
	if u, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && u.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Create(ctx, obj)
 | 
							return s.StandardStorage.Create(ctx, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// system:masters is special because the API server uses it for privileged loopback connections
 | 
					 | 
				
			||||||
		// therefore we know that a member of system:masters can always do anything
 | 
					 | 
				
			||||||
		for _, group := range u.GetGroups() {
 | 
					 | 
				
			||||||
			if group == user.SystemPrivilegedGroup {
 | 
					 | 
				
			||||||
				return s.StandardStorage.Create(ctx, obj)
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	roleBinding := obj.(*rbac.RoleBinding)
 | 
						roleBinding := obj.(*rbac.RoleBinding)
 | 
				
			||||||
	rules, err := s.ruleResolver.GetRoleReferenceRules(ctx, roleBinding.RoleRef, roleBinding.Namespace)
 | 
						rules, err := s.ruleResolver.GetRoleReferenceRules(ctx, roleBinding.RoleRef, roleBinding.Namespace)
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -69,11 +59,9 @@ func (s *Storage) Create(ctx api.Context, obj runtime.Object) (runtime.Object, e
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
					func (s *Storage) Update(ctx api.Context, name string, obj rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
 | 
				
			||||||
	if user, ok := api.UserFrom(ctx); ok {
 | 
						if rbacregistry.EscalationAllowed(ctx, s.superUser) {
 | 
				
			||||||
		if s.superUser != "" && user.GetName() == s.superUser {
 | 
					 | 
				
			||||||
		return s.StandardStorage.Update(ctx, name, obj)
 | 
							return s.StandardStorage.Update(ctx, name, obj)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
						nonEscalatingInfo := wrapUpdatedObjectInfo(obj, func(ctx api.Context, obj runtime.Object, oldObj runtime.Object) (runtime.Object, error) {
 | 
				
			||||||
		roleBinding := obj.(*rbac.RoleBinding)
 | 
							roleBinding := obj.(*rbac.RoleBinding)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,14 +25,18 @@ import (
 | 
				
			|||||||
	rbac "k8s.io/kubernetes/pkg/apis/rbac"
 | 
						rbac "k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					const saRolePrefix = "system:controller:"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
var (
 | 
					var (
 | 
				
			||||||
	// controllerRoles is a slice of roles used for controllers
 | 
						// controllerRoles is a slice of roles used for controllers
 | 
				
			||||||
	controllerRoles = []rbac.ClusterRole{}
 | 
						controllerRoles = []rbac.ClusterRole{}
 | 
				
			||||||
 | 
						// controllerRoleBindings is a slice of roles used for controllers
 | 
				
			||||||
 | 
						controllerRoleBindings = []rbac.ClusterRoleBinding{}
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func addControllerRole(role rbac.ClusterRole) {
 | 
					func addControllerRole(role rbac.ClusterRole) {
 | 
				
			||||||
	if !strings.HasPrefix(role.Name, "system:controller:") {
 | 
						if !strings.HasPrefix(role.Name, saRolePrefix) {
 | 
				
			||||||
		glog.Fatalf(`role %q must start with "system:controller:"`, role.Name)
 | 
							glog.Fatalf(`role %q must start with %q`, role.Name, saRolePrefix)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for _, existingRole := range controllerRoles {
 | 
						for _, existingRole := range controllerRoles {
 | 
				
			||||||
@@ -42,6 +46,8 @@ func addControllerRole(role rbac.ClusterRole) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	controllerRoles = append(controllerRoles, role)
 | 
						controllerRoles = append(controllerRoles, role)
 | 
				
			||||||
 | 
						controllerRoleBindings = append(controllerRoleBindings,
 | 
				
			||||||
 | 
							rbac.NewClusterBinding(role.Name).SAs("kube-system", role.Name[len(saRolePrefix):]).BindingOrDie())
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func eventsRule() rbac.PolicyRule {
 | 
					func eventsRule() rbac.PolicyRule {
 | 
				
			||||||
@@ -50,7 +56,7 @@ func eventsRule() rbac.PolicyRule {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func init() {
 | 
					func init() {
 | 
				
			||||||
	addControllerRole(rbac.ClusterRole{
 | 
						addControllerRole(rbac.ClusterRole{
 | 
				
			||||||
		ObjectMeta: api.ObjectMeta{Name: "system:controller:replication-controller"},
 | 
							ObjectMeta: api.ObjectMeta{Name: saRolePrefix + "replication-controller"},
 | 
				
			||||||
		Rules: []rbac.PolicyRule{
 | 
							Rules: []rbac.PolicyRule{
 | 
				
			||||||
			rbac.NewRule("get", "list", "watch", "update").Groups(legacyGroup).Resources("replicationcontrollers").RuleOrDie(),
 | 
								rbac.NewRule("get", "list", "watch", "update").Groups(legacyGroup).Resources("replicationcontrollers").RuleOrDie(),
 | 
				
			||||||
			rbac.NewRule("update").Groups(legacyGroup).Resources("replicationcontrollers/status").RuleOrDie(),
 | 
								rbac.NewRule("update").Groups(legacyGroup).Resources("replicationcontrollers/status").RuleOrDie(),
 | 
				
			||||||
@@ -64,3 +70,8 @@ func init() {
 | 
				
			|||||||
func ControllerRoles() []rbac.ClusterRole {
 | 
					func ControllerRoles() []rbac.ClusterRole {
 | 
				
			||||||
	return controllerRoles
 | 
						return controllerRoles
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// ControllerRoleBindings returns the role bindings used by controllers
 | 
				
			||||||
 | 
					func ControllerRoleBindings() []rbac.ClusterRoleBinding {
 | 
				
			||||||
 | 
						return controllerRoleBindings
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -19,6 +19,7 @@ package bootstrappolicy
 | 
				
			|||||||
import (
 | 
					import (
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/api"
 | 
						"k8s.io/kubernetes/pkg/api"
 | 
				
			||||||
	rbac "k8s.io/kubernetes/pkg/apis/rbac"
 | 
						rbac "k8s.io/kubernetes/pkg/apis/rbac"
 | 
				
			||||||
 | 
						"k8s.io/kubernetes/pkg/auth/user"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
var (
 | 
					var (
 | 
				
			||||||
@@ -48,3 +49,11 @@ func ClusterRoles() []rbac.ClusterRole {
 | 
				
			|||||||
		},
 | 
							},
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// ClusterRoleBindings return default rolebindings to the default roles
 | 
				
			||||||
 | 
					func ClusterRoleBindings() []rbac.ClusterRoleBinding {
 | 
				
			||||||
 | 
						return []rbac.ClusterRoleBinding{
 | 
				
			||||||
 | 
							rbac.NewClusterBinding("cluster-admin").Groups(user.SystemPrivilegedGroup).BindingOrDie(),
 | 
				
			||||||
 | 
							rbac.NewClusterBinding("system:discovery").Groups(user.AllAuthenticated, user.AllUnauthenticated).BindingOrDie(),
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user