1

返回以下错误:

error: you must specify two or three arguments: verb, resource, and optional resourceName

当我执行时:

kubectl auth --as=system:serviceaccount:mytest1:default can-i use psp 00-mytest1

我已经有podsecuritypolicy(psp.yaml)、role(role.yaml) 和rolebinding(rb.yaml) 的以下清单并部署在 namespace 中mytest1

psp.yaml

    apiVersion: policy/v1beta1
    kind: PodSecurityPolicy
    metadata:
      name: 00-mytest1
      labels: {}
      annotations:
        seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default'
        seccomp.security.alpha.kubernetes.io/defaultProfileName:  'runtime/default'
    spec:
      privileged: false
      allowPrivilegeEscalation: false
      requiredDropCapabilities:
      - ALL
      runAsUser:
        rule: 'MustRunAsNonRoot'
      runAsGroup:
        rule: 'MustRunAs'
        ranges:
        - min: 1000 
          max: 1000
        - min: 1
          max: 65535
      supplementalGroups:
        rule: 'MayRunAs'
        ranges:
        - min: 1
          max: 65535
      fsGroup:
        rule: 'MayRunAs'
        ranges:
        - min: 1
          max: 65535
      seLinux:
        rule: 'RunAsAny'
      hostNetwork: false
      hostIPC: false
      hostPID: false
      hostPorts: []
      volumes:
      - configMap
      - downwardAPI
      - emptyDir
      - projected
      - secret

角色.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: Role
    metadata:
      name: mytest1
      namespace: "mytest1"
      labels: {}
    rules:
    - apiGroups: ['policy']
      resources: ['podsecuritypolicies']
      verbs:     ['use']
      resourceNames: ['00-mytest1']

和 rb.yaml

    apiVersion: rbac.authorization.k8s.io/v1
    kind: RoleBinding
    metadata:
      name: mytest1
      namespace: "mytest1"
      labels: {}
    roleRef:
      apiGroup: rbac.authorization.k8s.io
      kind: Role
      name: mytest1
    subjects:
    - kind: ServiceAccount
      name: default
      namespace: "mytest1"

我希望返回yesno检查kubectl auth can-i ...而不是上述错误。验证检查的用例是否正确?我很欣赏他的指正。

4

1 回答 1

1

你错过了旗帜--subresource。如果我执行

kubectl auth --as=system:serviceaccount:mytest1:default can-i use psp --subresource=00-mytest1

我有明确的答案。在我的情况下:

no

你也可以得到这样的警告:

Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'

但它与您的配置直接相关。

有关 kubectl auth can-i 命令检查的更多信息

kubectl auth can-i --help

在您的终端中。您也可以阅读此文档

于 2021-09-13T11:10:13.747 回答