zoukankan      html  css  js  c++  java
  • 十二,k8s集群访问控制之RBAC授权

    角色访问控制RBAC (Role-Based Access Control)

    常用的授权插件:

    1. Node:节点认证
    2. ABAC:基于属性的访问控制
    3. RBAC:基于角色的访问控制
    4. Webhook:基于HTTP回调机制

    RBAC控制:

    RBAC 主要的功能是提供基于角色(Role)的访问控制许可(permission)

    解释: 让一个用户扮演一个角色(Role),而角色(Role)拥有某些操作的权限,那么这么用户就拥有了该角色的操作权限。
    

    所以说,之后的所有的操作许可,都是直接授权给角色(Role),而不是直接授权给用户。

    对象
    对象列表
    虚拟对象,通常是URL,非对象资源,
    

    对某个对象施加的一种行为,成为 Action。

    role 和 clusterrole

    在RBAC API中,一个角色包含了一套表示一组权限的规则。 权限以纯粹的累加形式累积(没有”否定”的规则)。 角色可以由命名空间(namespace)内的Role对象定义,而整个Kubernetes集群范围内有效的角色则通过ClusterRole对象实现。

    role中,定义对象和动作,决定此role的权限边界。
    在role中,只能定义那些对象的动作被允许,不能定义决绝。
    意思就是说,只要没有定义允许的,都会被拒绝。
    

    角色分为两种:

    1. role         名称空间级别角色
    2. clusterrole  集群级别角色
    

    rolebinding 和 clusterrolebinding

    用于用户和角色之间的绑定关系。role和useraccount或service account之间的绑定
    

    绑定分为两种:

    1. rolebinding          名称空间界别的角色绑定,针对的边界是名称空间
    2. clusterrolebinding   集群级别的基色绑定,针对的变边界是集群
    

    问题: 当使用rolebinding 来对 user1 绑定 clusterrole,那么 user1 的权限是?

    解答: user1 的权限还是局限于名称空间,因为使用的是 rolebinding 来绑定的,突破不来名称空间。

    公共角色 clusterrole

    常规做法

    每个名称空间下,user都通过rolebinding绑定role,定义一个ClusterRole拥有集群级别的操作权限,通过ClusterRolebinding与user绑定,该用户user就有了集群级别的操作权限

    便捷做法

    假设再有多个pod情况下,如果此时定义好一个 clusterrole 集群角色和对应的权限,使用 Rolebinding 对集群角色 clusterrole 进行绑定,那么所有的名称空间都可以不用定义自己的 role ,直接使用 clusterrole即可。

    以上几种关系的示意图

    user 创建测试

    创建role案例

    帮助:

    [root@master ~]# kubectl create role --help
    Create a role with single rule.
    
    Examples:
      # Create a Role named "pod-reader" that allows user to perform "get", "watch" and "list" on pods
      kubectl create role pod-reader --verb=get --verb=list --verb=watch --resource=pods
      
      # Create a Role named "pod-reader" with ResourceName specified
      kubectl create role pod-reader --verb=get --resource=pods --resource-name=readablepod --resource-name=anotherpod
      
      # Create a Role named "foo" with API Group specified
      kubectl create role foo --verb=get,list,watch --resource=rs.extensions
      
      # Create a Role named "foo" with SubResource specified
      kubectl create role foo --verb=get,list,watch --resource=pods,pods/status
    
    1. 通过 --dry-run 参数,使命令不是真正执行,只是模拟测试命令是否正常。
    2. 通过 -o yaml 以 yaml 格式输出

    那么下面使用这两个参数,导出一个 yaml 格式的文件。

    [root@master rbac]# kubectl create role pods-reader --verb=get,list,watch --resource=pods --dry-run
    role.rbac.authorization.k8s.io/pods-reader created (dry run)
    [root@master rbac]# kubectl create role pods-reader --verb=get,list,watch --resource=pods --dry-run -o yaml
    apiVersion: rbac.authorization.k8s.io/v1
    kind: Role
    metadata:
      creationTimestamp: null
      name: pods-reader
    rules:
    - apiGroups:
      - ""
      resources:
      - pods
      verbs:
      - get
      - list
      - watch
    [root@master rbac]# kubectl create role pods-reader --verb=get,list,watch --resource=pods --dry-run -o yaml > role-demo.yaml
    [root@master rbac]# ll
    total 4
    -rw-r--r-- 1 root root 193 Aug 21 16:56 role-demo.yaml
    [root@master rbac]# cat role-demo.yaml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: Role
    metadata:
      creationTimestamp: null
      name: pods-reader
    rules:
    - apiGroups:
      - ""
      resources:
      - pods
      verbs:
      - get
      - list
      - watch
    

    创建 role

    [root@master rbac]# kubectl apply -f role-demo.yaml 
    role.rbac.authorization.k8s.io/pods-reader created
    [root@master rbac]# kubectl get role
    NAME          AGE
    pods-reader   2s
    [root@master rbac]# kubectl describe role pods-reader
    Name:         pods-reader
    Labels:       <none>
    Annotations:  kubectl.kubernetes.io/last-applied-configuration:
                    {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"Role","metadata":{"annotations":{},"name":"pods-reader","namespace":"default"},"rules...
    PolicyRule:
      Resources  Non-Resource URLs  Resource Names  Verbs
      ---------  -----------------  --------------  -----
      pods       []                 []              [get list watch]    # 这里显示的权限等详细信息
    

    在之前创建了一个用户 jerry,此时就可以来绑定刚刚创建的role了。

    rolebinding 绑定 jerry用户

    使用相同的方式:

    [root@master rbac]# kubectl create rolebinding jerry-read-pods --role=pods-reader --user=jerry --dry-run -o yaml > rolebinding-demo.yaml
    [root@master rbac]# cat rolebinding-demo.yaml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      creationTimestamp: null
      name: jerry-read-pods
    roleRef:            #  表示引用那个角色(role)
      apiGroup: rbac.authorization.k8s.io
      kind: Role            #表示绑定角色为role
      name: pods-reader     # 绑定的role名称
    subjects:               # 绑定的用户,类型可以为user,group,ServiceAccount
    - apiGroup: rbac.authorization.k8s.io
      kind: User           #user,group,ServiceAccount三种类型均可
      name: jerry           # 绑定的具体用户名
    

    创建:

    [root@master rbac]# kubectl apply -f rolebinding-demo.yaml 
    rolebinding.rbac.authorization.k8s.io/jerry-read-pods created
    [root@master rbac]# kubectl get rolebinding
    NAME              AGE
    jerry-read-pods   5s
    [root@master rbac]# kubectl describe rolebinding/jerry-read-pods
    Name:         jerry-read-pods
    Labels:       <none>
    Annotations:  kubectl.kubernetes.io/last-applied-configuration:
                    {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"RoleBinding","metadata":{"annotations":{},"creationTimestamp":null,"name":"jerry-read...
    Role:
      Kind:  Role
      Name:  pods-reader
    Subjects:
      Kind  Name   Namespace
      ----  ----   ---------
      User  jerry
    

    测试 jerry 权限

    此时切换到 jerry 用户下进行测试权限:

    [root@master rbac]# kubectl config use-context jerry@kubernetes
    Switched to context "jerry@kubernetes".
    [root@master rbac]# kubectl get pods
    NAME          READY   STATUS    RESTARTS   AGE
    pod-sa-demo   1/1     Running   0          5d3h
    [root@master rbac]# kubectl delete pods/pod-sa-demo
    Error from server (Forbidden): pods "pod-sa-demo" is forbidden: User "jerry" cannot delete resource "pods" in API group "" in the namespace "default"
    [root@master rbac]# kubectl get pods -n kube-system
    Error from server (Forbidden): pods is forbidden: User "jerry" cannot list resource "pods" in API group "" in the namespace "kube-system"
    

    从上面演示可以看出,只有查看名称空间为default 的权限,没有其它等删除的权限,也查看不来其它名称空间的资源。

    clusterrole 测试

    定义方式和 role 几乎相同,查看帮助如下:

    [root@master ~]# kubectl create clusterrole --help
    Create a ClusterRole.
    
    Examples:
      # Create a ClusterRole named "pod-reader" that allows user to perform "get", "watch" and "list" on pods
      kubectl create clusterrole pod-reader --verb=get,list,watch --resource=pods
      
      # Create a ClusterRole named "pod-reader" with ResourceName specified
      kubectl create clusterrole pod-reader --verb=get --resource=pods --resource-name=readablepod
    --resource-name=anotherpod
      
      # Create a ClusterRole named "foo" with API Group specified
      kubectl create clusterrole foo --verb=get,list,watch --resource=rs.extensions
      
      # Create a ClusterRole named "foo" with SubResource specified
      kubectl create clusterrole foo --verb=get,list,watch --resource=pods,pods/status
      
      # Create a ClusterRole name "foo" with NonResourceURL specified
      kubectl create clusterrole "foo" --verb=get --non-resource-url=/logs/*
      
      # Create a ClusterRole name "monitoring" with AggregationRule specified
      kubectl create clusterrole monitoring --aggregation-rule="rbac.example.com/aggregate-to-monitoring=true"
    

    创建 clusterrole

    [root@master rbac]# kubectl create clusterrole cluster-reader --verb=get,list,watch --resource=pods --dry-run -o yaml > clusterrole-demo.yaml
    [root@master rbac]# cat clusterrole-demo.yaml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: ClusterRole
    metadata:
      creationTimestamp: null
      name: cluster-reader
    rules:
    - apiGroups:
      - ""
      resources:
      - pods
      verbs:
      - get
      - list
      - watch
    [root@master rbac]# kubectl apply -f clusterrole-demo.yaml 
    clusterrole.rbac.authorization.k8s.io/cluster-reader created
    [root@master rbac]# kubectl describe clusterrole/cluster-reader
    Name:         cluster-reader
    Labels:       <none>
    Annotations:  kubectl.kubernetes.io/last-applied-configuration:
                    {"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"creationTimestamp":null,"name":"cluster-re...
    PolicyRule:
      Resources  Non-Resource URLs  Resource Names  Verbs
      ---------  -----------------  --------------  -----
      pods       []                 []              [get list watch]
    

    测试绑定jerry用户

    之前jerry绑定了一个role,此时需要把这个rolebinding删除,然后在绑定clusterrole

    [root@master rbac]# kubectl create clusterrolebinding jerry-read-all-pods --clusterrole=cluster-reader --user=jerry --dry-run -o yaml > clusterrolebinding-demo.yaml
    [root@master rbac]# cat clusterrolebinding-demo.yaml 
    apiVersion: rbac.authorization.k8s.io/v1beta1
    kind: ClusterRoleBinding
    metadata:
      creationTimestamp: null
      name: jerry-read-all-pods
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole
      name: cluster-reader
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: jerry
    [root@master rbac]# kubectl apply -f clusterrolebinding-demo.yaml 
    clusterrolebinding.rbac.authorization.k8s.io/jerry-read-all-pods created
    [root@master rbac]# kubectl describe clusterrolebinding/jerry-read-all-pods
    Name:         jerry-read-all-pods
    Labels:       <none>
    Annotations:  kubectl.kubernetes.io/last-applied-configuration:
                    {"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"creationTimestamp":null,"name"...
    Role:
      Kind:  ClusterRole
      Name:  cluster-reader
    Subjects:
      Kind  Name   Namespace
      ----  ----   ---------
      User  jerry
    

    测试jerry权限

    切换至 jerry,然后进行访问测试:

    [root@master rbac]# kubectl get pods
    NAME          READY   STATUS    RESTARTS   AGE
    pod-sa-demo   1/1     Running   0          5d4h
    [root@master rbac]# kubectl get pods -n kube-system
    NAME                                        READY   STATUS    RESTARTS   AGE
    coredns-5c98db65d4-8mzfz                    1/1     Running   0          43d
    coredns-5c98db65d4-spjx8                    1/1     Running   0          43d
    etcd-master.kubernetes                      1/1     Running   0          43d
    kube-apiserver-master.kubernetes            1/1     Running   0          43d
    kube-controller-manager-master.kubernetes   1/1     Running   0          43d
    kube-flannel-ds-amd64-4szk7                 1/1     Running   0          43d
    kube-flannel-ds-amd64-b4ssp                 1/1     Running   1          43d
    kube-flannel-ds-amd64-nmklz                 1/1     Running   0          43d
    kube-flannel-ds-amd64-wjczq                 1/1     Running   0          43d
    kube-proxy-8fqsz                            1/1     Running   0          43d
    kube-proxy-bkrw4                            1/1     Running   0          43d
    kube-proxy-n75g8                            1/1     Running   1          43d
    kube-proxy-rmckk                            1/1     Running   0          43d
    kube-scheduler-master.kubernetes            1/1     Running   0          43d
    kubernetes-dashboard-7d75c474bb-8kzrl       1/1     Running   0          9d
    [root@master rbac]# kubectl get service
    Error from server (Forbidden): services is forbidden: User "jerry" cannot list resource "services" in API group "" in the namespace "default"
    [root@master rbac]# kubectl get service -n kube-system
    Error from server (Forbidden): services is forbidden: User "jerry" cannot list resource "services" in API group "" in the namespace "kube-system"
    

    从上面测试可以看出:

    1. 可以访问default名称空间的pods资源,但不能访问service资源。
    2. 可以访问 kube-system 名称空间的资源, 也不能访问 kube-system 名称空间 service资源。

    测试rolebinding绑定clusterrole

    先删除jerry刚刚binding的clusterrolebinding

    [root@master rbac]# kubectl delete -f clusterrolebinding-demo.yaml 
    clusterrolebinding.rbac.authorization.k8s.io "jerry-read-all-pods" deleted
    [root@master rbac]# kubectl config use-context jerry@kubernetes
    Switched to context "jerry@kubernetes".
    [root@master rbac]# kubectl get pods
    Error from server (Forbidden): pods is forbidden: User "jerry" cannot list resource "pods" in API group "" in the namespace "default"
    

    可以看到,删除clusterrolebinding后,jerry用户没有get权限。

    下面使用rolebinding绑定clusterrole

    [root@master rbac]# kubectl create rolebinding jerry-read-pods --clusterrole=cluster-reader --user=jerry --dry-run
    rolebinding.rbac.authorization.k8s.io/jerry-read-pods created (dry run)
    [root@master rbac]# kubectl create rolebinding jerry-read-pods --clusterrole=cluster-reader --user=jerry --dry-run -o yaml > rolebinding-clusterrole-demo.yaml
    [root@master rbac]# cat rolebinding-clusterrole-demo.yaml 
    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding                           # 这里的类型是rolebinding
    metadata:
      name: jerry-read-pods
      namespace: default                        # 编辑增加可访问的名称空间
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: ClusterRole                         # 而这里绑定的是clusterrole
      name: cluster-reader
    subjects:
    - apiGroup: rbac.authorization.k8s.io
      kind: User
      name: jerry                               # 绑定的用户
    [root@master rbac]# kubectl apply -f rolebinding-clusterrole-demo.yaml 
    rolebinding.rbac.authorization.k8s.io/jerry-read-pods created
    

    测试访问

    [root@master rbac]# kubectl get pods
    NAME          READY   STATUS    RESTARTS   AGE
    pod-sa-demo   1/1     Running   0          5d19h
    [root@master rbac]# kubectl get pods -n kube-system
    Error from server (Forbidden): pods is forbidden: User "jerry" cannot list resource "pods" in API group "" in the namespace "kube-system"
    

    测试只能访问 default 名称空间的资源,而不能访问其他名称空间的资源。

    clusterrole admin 默认角色

    在clusterrole 中,有两个默认的admin角色,admin、cluster-admin

    这两个都是集群角色的管理员,那么当集群中有多个名称空间的时候,就不需要手动去创建管理员角色,直接可以使用admin的角色机型rolebinding,这样省去了很多重复工作。

    测试绑定

    测试把 clusterrole 的 admin 角色绑定到 jerry 用户上。

    之前已经绑定了一个clusterrole,此时再次绑定,不受影响,相当于一人身兼多职。

    [root@master rbac]# kubectl create rolebinding defult-ns-admin --clusterrole=admin --user=jerry
    rolebinding.rbac.authorization.k8s.io/defult-ns-admin created
    [root@master rbac]# kubectl config use-context jerry@kubernetes         # 切换到jerry用户
    Switched to context "jerry@kubernetes".
    [root@master rbac]# kubectl get pods                                    # 能够读
    NAME          READY   STATUS    RESTARTS   AGE
    pod-sa-demo   1/1     Running   0          5d20h
    [root@master rbac]# kubectl delete pods pod-sa-demo
    pod "pod-sa-demo" deleted                                               # 删除成功
    [root@master rbac]# kubectl get pods
    No resources found.
    [root@master rbac]# kubectl get pods -n kube-system                     # 但这里不能访问其他名称空间
    Error from server (Forbidden): pods is forbidden: User "jerry" cannot list resource "pods" in API group "" in the namespace "kube-system" 
    
  • 相关阅读:
    eclipse/intellij idea 查看java源码和注释
    理解线程池,看这篇足够了-转
    乐观锁的幂等性方案
    springboot2.0以后的junit
    详解 Java 中的三种代理模式
    MYSQL慢查询配置
    MySQL 数据库性能优化之SQL优化【转】
    SQL中EXPLAIN命令详解---(转)
    spring的面试
    sql joins 7
  • 原文地址:https://www.cnblogs.com/peng-zone/p/11689017.html
Copyright © 2011-2022 走看看