// GetRequestAttributes populates authorizer attributes for the requests to the kubelet API. // Default attributes are: {apiVersion=v1,verb=<http verb from request>,resource=nodes,name=<node name>,subresource=proxy} // More specific verb/resource is set for the following request patterns: // /stats/* => verb=<api verb from request>, resource=nodes, name=<node name>, subresource=stats // /metrics/* => verb=<api verb from request>, resource=nodes, name=<node name>, subresource=metrics // /logs/* => verb=<api verb from request>, resource=nodes, name=<node name>, subresource=log // /spec/* => verb=<api verb from request>, resource=nodes, name=<node name>, subresource=spec func (n nodeAuthorizerAttributesGetter) GetRequestAttributes(u user.Info, r *http.Request) authorizer.Attributes { apiVerb := "" switch r.Method { case "POST": apiVerb = "create" case "GET": apiVerb = "get" case "PUT": apiVerb = "update" case "PATCH": apiVerb = "patch" case "DELETE": apiVerb = "delete" } requestPath := r.URL.Path // Default attributes mirror the API attributes that would allow this access to the kubelet API attrs := authorizer.AttributesRecord{ User: u, Verb: apiVerb, Namespace: "", APIGroup: "", APIVersion: "v1", Resource: "nodes", Subresource: "proxy", Name: string(n.nodeName), ResourceRequest: true, Path: requestPath, } // Override subresource for specific paths // This allows subdividing access to the kubelet API switch { case isSubpath(requestPath, statsPath): attrs.Subresource = "stats" case isSubpath(requestPath, metricsPath): attrs.Subresource = "metrics" case isSubpath(requestPath, logsPath): // "log" to match other log subresources (pods/log, etc) attrs.Subresource = "log" case isSubpath(requestPath, specPath): attrs.Subresource = "spec" } glog.V(5).Infof("Node request attributes: attrs=%#v", attrs) return attrs }
// BindingAuthorized returns true if the user associated with the context is explicitly authorized to bind the specified roleRef func BindingAuthorized(ctx genericapirequest.Context, roleRef rbac.RoleRef, bindingNamespace string, a authorizer.Authorizer) bool { if a == nil { return false } user, ok := genericapirequest.UserFrom(ctx) if !ok { return false } attrs := authorizer.AttributesRecord{ User: user, Verb: "bind", // check against the namespace where the binding is being created (or the empty namespace for clusterrolebindings). // this allows delegation to bind particular clusterroles in rolebindings within particular namespaces, // and to authorize binding a clusterrole across all namespaces in a clusterrolebinding. Namespace: bindingNamespace, ResourceRequest: true, } // This occurs after defaulting and conversion, so values pulled from the roleRef won't change // Invalid APIGroup or Name values will fail validation switch roleRef.Kind { case "ClusterRole": attrs.APIGroup = roleRef.APIGroup attrs.Resource = "clusterroles" attrs.Name = roleRef.Name case "Role": attrs.APIGroup = roleRef.APIGroup attrs.Resource = "roles" attrs.Name = roleRef.Name default: return false } ok, _, err := a.Authorize(attrs) if err != nil { utilruntime.HandleError(fmt.Errorf( "error authorizing user %#v to bind %#v in namespace %s: %v", roleRef, bindingNamespace, user, err, )) } return ok }
func GetAuthorizerAttributes(ctx request.Context) (authorizer.Attributes, error) { attribs := authorizer.AttributesRecord{} user, ok := request.UserFrom(ctx) if ok { attribs.User = user } requestInfo, found := request.RequestInfoFrom(ctx) if !found { return nil, errors.New("no RequestInfo found in the context") } // Start with common attributes that apply to resource and non-resource requests attribs.ResourceRequest = requestInfo.IsResourceRequest attribs.Path = requestInfo.Path attribs.Verb = requestInfo.Verb attribs.APIGroup = requestInfo.APIGroup attribs.APIVersion = requestInfo.APIVersion attribs.Resource = requestInfo.Resource attribs.Subresource = requestInfo.Subresource attribs.Namespace = requestInfo.Namespace attribs.Name = requestInfo.Name return &attribs, nil }