123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package auth
- import (
- "errors"
- "fmt"
- "io"
- "io/ioutil"
- "os"
- "sort"
- "strings"
- "github.com/spf13/cobra"
- authorizationv1 "k8s.io/api/authorization/v1"
- rbacv1 "k8s.io/api/rbac/v1"
- "k8s.io/apimachinery/pkg/api/meta"
- "k8s.io/apimachinery/pkg/runtime/schema"
- utilerrors "k8s.io/apimachinery/pkg/util/errors"
- "k8s.io/cli-runtime/pkg/genericclioptions"
- discovery "k8s.io/client-go/discovery"
- authorizationv1client "k8s.io/client-go/kubernetes/typed/authorization/v1"
- cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
- describeutil "k8s.io/kubernetes/pkg/kubectl/describe/versioned"
- "k8s.io/kubernetes/pkg/kubectl/util/printers"
- rbacutil "k8s.io/kubernetes/pkg/kubectl/util/rbac"
- "k8s.io/kubernetes/pkg/kubectl/util/templates"
- )
- // CanIOptions is the start of the data required to perform the operation. As new fields are added, add them here instead of
- // referencing the cmd.Flags()
- type CanIOptions struct {
- AllNamespaces bool
- Quiet bool
- NoHeaders bool
- Namespace string
- AuthClient authorizationv1client.AuthorizationV1Interface
- DiscoveryClient discovery.DiscoveryInterface
- Verb string
- Resource schema.GroupVersionResource
- NonResourceURL string
- Subresource string
- ResourceName string
- List bool
- genericclioptions.IOStreams
- }
- var (
- canILong = templates.LongDesc(`
- Check whether an action is allowed.
- VERB is a logical Kubernetes API verb like 'get', 'list', 'watch', 'delete', etc.
- TYPE is a Kubernetes resource. Shortcuts and groups will be resolved.
- NONRESOURCEURL is a partial URL starts with "/".
- NAME is the name of a particular Kubernetes resource.`)
- canIExample = templates.Examples(`
- # Check to see if I can create pods in any namespace
- kubectl auth can-i create pods --all-namespaces
- # Check to see if I can list deployments in my current namespace
- kubectl auth can-i list deployments.extensions
- # Check to see if I can do everything in my current namespace ("*" means all)
- kubectl auth can-i '*' '*'
- # Check to see if I can get the job named "bar" in namespace "foo"
- kubectl auth can-i list jobs.batch/bar -n foo
- # Check to see if I can read pod logs
- kubectl auth can-i get pods --subresource=log
- # Check to see if I can access the URL /logs/
- kubectl auth can-i get /logs/
- # List all allowed actions in namespace "foo"
- kubectl auth can-i --list --namespace=foo`)
- )
- // NewCmdCanI returns an initialized Command for 'auth can-i' sub command
- func NewCmdCanI(f cmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {
- o := &CanIOptions{
- IOStreams: streams,
- }
- cmd := &cobra.Command{
- Use: "can-i VERB [TYPE | TYPE/NAME | NONRESOURCEURL]",
- DisableFlagsInUseLine: true,
- Short: "Check whether an action is allowed",
- Long: canILong,
- Example: canIExample,
- Run: func(cmd *cobra.Command, args []string) {
- cmdutil.CheckErr(o.Complete(f, args))
- cmdutil.CheckErr(o.Validate())
- var err error
- if o.List {
- err = o.RunAccessList()
- } else {
- var allowed bool
- allowed, err = o.RunAccessCheck()
- if err == nil {
- if !allowed {
- os.Exit(1)
- }
- }
- }
- cmdutil.CheckErr(err)
- },
- }
- cmd.Flags().BoolVarP(&o.AllNamespaces, "all-namespaces", "A", o.AllNamespaces, "If true, check the specified action in all namespaces.")
- cmd.Flags().BoolVarP(&o.Quiet, "quiet", "q", o.Quiet, "If true, suppress output and just return the exit code.")
- cmd.Flags().StringVar(&o.Subresource, "subresource", o.Subresource, "SubResource such as pod/log or deployment/scale")
- cmd.Flags().BoolVar(&o.List, "list", o.List, "If true, prints all allowed actions.")
- cmd.Flags().BoolVar(&o.NoHeaders, "no-headers", o.NoHeaders, "If true, prints allowed actions without headers")
- return cmd
- }
- // Complete completes all the required options
- func (o *CanIOptions) Complete(f cmdutil.Factory, args []string) error {
- if o.List {
- if len(args) != 0 {
- return errors.New("list option must be specified with no arguments")
- }
- } else {
- if o.Quiet {
- o.Out = ioutil.Discard
- }
- switch len(args) {
- case 2:
- o.Verb = args[0]
- if strings.HasPrefix(args[1], "/") {
- o.NonResourceURL = args[1]
- break
- }
- resourceTokens := strings.SplitN(args[1], "/", 2)
- restMapper, err := f.ToRESTMapper()
- if err != nil {
- return err
- }
- o.Resource = o.resourceFor(restMapper, resourceTokens[0])
- if len(resourceTokens) > 1 {
- o.ResourceName = resourceTokens[1]
- }
- default:
- return errors.New("you must specify two or three arguments: verb, resource, and optional resourceName")
- }
- }
- var err error
- client, err := f.KubernetesClientSet()
- if err != nil {
- return err
- }
- o.AuthClient = client.AuthorizationV1()
- o.DiscoveryClient = client.Discovery()
- o.Namespace = ""
- if !o.AllNamespaces {
- o.Namespace, _, err = f.ToRawKubeConfigLoader().Namespace()
- if err != nil {
- return err
- }
- }
- return nil
- }
- // Validate makes sure provided values for CanIOptions are valid
- func (o *CanIOptions) Validate() error {
- if o.List {
- if o.Quiet || o.AllNamespaces || o.Subresource != "" {
- return errors.New("list option can't be specified with neither quiet, all-namespaces nor subresource options")
- }
- return nil
- }
- if o.NonResourceURL != "" {
- if o.Subresource != "" {
- return fmt.Errorf("--subresource can not be used with NonResourceURL")
- }
- if o.Resource != (schema.GroupVersionResource{}) || o.ResourceName != "" {
- return fmt.Errorf("NonResourceURL and ResourceName can not specified together")
- }
- } else if !o.Resource.Empty() && !o.AllNamespaces && o.DiscoveryClient != nil {
- if namespaced, err := isNamespaced(o.Resource, o.DiscoveryClient); err == nil && !namespaced {
- if len(o.Resource.Group) == 0 {
- fmt.Fprintf(o.ErrOut, "Warning: resource '%s' is not namespace scoped\n", o.Resource.Resource)
- } else {
- fmt.Fprintf(o.ErrOut, "Warning: resource '%s' is not namespace scoped in group '%s'\n", o.Resource.Resource, o.Resource.Group)
- }
- }
- }
- if o.NoHeaders {
- return fmt.Errorf("--no-headers cannot be set without --list specified")
- }
- return nil
- }
- // RunAccessList lists all the access current user has
- func (o *CanIOptions) RunAccessList() error {
- sar := &authorizationv1.SelfSubjectRulesReview{
- Spec: authorizationv1.SelfSubjectRulesReviewSpec{
- Namespace: o.Namespace,
- },
- }
- response, err := o.AuthClient.SelfSubjectRulesReviews().Create(sar)
- if err != nil {
- return err
- }
- return o.printStatus(response.Status)
- }
- // RunAccessCheck checks if user has access to a certain resource or non resource URL
- func (o *CanIOptions) RunAccessCheck() (bool, error) {
- var sar *authorizationv1.SelfSubjectAccessReview
- if o.NonResourceURL == "" {
- sar = &authorizationv1.SelfSubjectAccessReview{
- Spec: authorizationv1.SelfSubjectAccessReviewSpec{
- ResourceAttributes: &authorizationv1.ResourceAttributes{
- Namespace: o.Namespace,
- Verb: o.Verb,
- Group: o.Resource.Group,
- Resource: o.Resource.Resource,
- Subresource: o.Subresource,
- Name: o.ResourceName,
- },
- },
- }
- } else {
- sar = &authorizationv1.SelfSubjectAccessReview{
- Spec: authorizationv1.SelfSubjectAccessReviewSpec{
- NonResourceAttributes: &authorizationv1.NonResourceAttributes{
- Verb: o.Verb,
- Path: o.NonResourceURL,
- },
- },
- }
- }
- response, err := o.AuthClient.SelfSubjectAccessReviews().Create(sar)
- if err != nil {
- return false, err
- }
- if response.Status.Allowed {
- fmt.Fprintln(o.Out, "yes")
- } else {
- fmt.Fprint(o.Out, "no")
- if len(response.Status.Reason) > 0 {
- fmt.Fprintf(o.Out, " - %v", response.Status.Reason)
- }
- if len(response.Status.EvaluationError) > 0 {
- fmt.Fprintf(o.Out, " - %v", response.Status.EvaluationError)
- }
- fmt.Fprintln(o.Out)
- }
- return response.Status.Allowed, nil
- }
- func (o *CanIOptions) resourceFor(mapper meta.RESTMapper, resourceArg string) schema.GroupVersionResource {
- if resourceArg == "*" {
- return schema.GroupVersionResource{Resource: resourceArg}
- }
- fullySpecifiedGVR, groupResource := schema.ParseResourceArg(strings.ToLower(resourceArg))
- gvr := schema.GroupVersionResource{}
- if fullySpecifiedGVR != nil {
- gvr, _ = mapper.ResourceFor(*fullySpecifiedGVR)
- }
- if gvr.Empty() {
- var err error
- gvr, err = mapper.ResourceFor(groupResource.WithVersion(""))
- if err != nil {
- if len(groupResource.Group) == 0 {
- fmt.Fprintf(o.ErrOut, "Warning: the server doesn't have a resource type '%s'\n", groupResource.Resource)
- } else {
- fmt.Fprintf(o.ErrOut, "Warning: the server doesn't have a resource type '%s' in group '%s'\n", groupResource.Resource, groupResource.Group)
- }
- return schema.GroupVersionResource{Resource: resourceArg}
- }
- }
- return gvr
- }
- func (o *CanIOptions) printStatus(status authorizationv1.SubjectRulesReviewStatus) error {
- if status.Incomplete {
- fmt.Fprintf(o.ErrOut, "warning: the list may be incomplete: %v\n", status.EvaluationError)
- }
- breakdownRules := []rbacv1.PolicyRule{}
- for _, rule := range convertToPolicyRule(status) {
- breakdownRules = append(breakdownRules, rbacutil.BreakdownRule(rule)...)
- }
- compactRules, err := rbacutil.CompactRules(breakdownRules)
- if err != nil {
- return err
- }
- sort.Stable(rbacutil.SortableRuleSlice(compactRules))
- w := printers.GetNewTabWriter(o.Out)
- defer w.Flush()
- allErrs := []error{}
- if !o.NoHeaders {
- if err := printAccessHeaders(w); err != nil {
- allErrs = append(allErrs, err)
- }
- }
- if err := printAccess(w, compactRules); err != nil {
- allErrs = append(allErrs, err)
- }
- return utilerrors.NewAggregate(allErrs)
- }
- func convertToPolicyRule(status authorizationv1.SubjectRulesReviewStatus) []rbacv1.PolicyRule {
- ret := []rbacv1.PolicyRule{}
- for _, resource := range status.ResourceRules {
- ret = append(ret, rbacv1.PolicyRule{
- Verbs: resource.Verbs,
- APIGroups: resource.APIGroups,
- Resources: resource.Resources,
- ResourceNames: resource.ResourceNames,
- })
- }
- for _, nonResource := range status.NonResourceRules {
- ret = append(ret, rbacv1.PolicyRule{
- Verbs: nonResource.Verbs,
- NonResourceURLs: nonResource.NonResourceURLs,
- })
- }
- return ret
- }
- func printAccessHeaders(out io.Writer) error {
- columnNames := []string{"Resources", "Non-Resource URLs", "Resource Names", "Verbs"}
- _, err := fmt.Fprintf(out, "%s\n", strings.Join(columnNames, "\t"))
- return err
- }
- func printAccess(out io.Writer, rules []rbacv1.PolicyRule) error {
- for _, r := range rules {
- if _, err := fmt.Fprintf(out, "%s\t%v\t%v\t%v\n", describeutil.CombineResourceGroup(r.Resources, r.APIGroups), r.NonResourceURLs, r.ResourceNames, r.Verbs); err != nil {
- return err
- }
- }
- return nil
- }
- func isNamespaced(gvr schema.GroupVersionResource, discoveryClient discovery.DiscoveryInterface) (bool, error) {
- if gvr.Resource == "*" {
- return true, nil
- }
- apiResourceList, err := discoveryClient.ServerResourcesForGroupVersion(schema.GroupVersion{
- Group: gvr.Group, Version: gvr.Version,
- }.String())
- if err != nil {
- return true, err
- }
- for _, resource := range apiResourceList.APIResources {
- if resource.Name == gvr.Resource {
- return resource.Namespaced, nil
- }
- }
- return false, fmt.Errorf("the server doesn't have a resource type '%s' in group '%s'", gvr.Resource, gvr.Group)
- }
|