返回以下错误:
error: you must specify two or three arguments: verb, resource, and optional resourceName当我执行的时候:
kubectl auth --as=system:serviceaccount:mytest1:default can-i use psp 00-mytest1我已经有了以下针对podsecuritypolicy (psp.yaml)、role (role.yaml)和rolebinding (rb.yaml)的清单,并部署在名称空间mytest1中。
psp.yaml
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: 00-mytest1
labels: {}
annotations:
seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'runtime/default'
seccomp.security.alpha.kubernetes.io/defaultProfileName: 'runtime/default'
spec:
privileged: false
allowPrivilegeEscalation: false
requiredDropCapabilities:
- ALL
runAsUser:
rule: 'MustRunAsNonRoot'
runAsGroup:
rule: 'MustRunAs'
ranges:
- min: 1000
max: 1000
- min: 1
max: 65535
supplementalGroups:
rule: 'MayRunAs'
ranges:
- min: 1
max: 65535
fsGroup:
rule: 'MayRunAs'
ranges:
- min: 1
max: 65535
seLinux:
rule: 'RunAsAny'
hostNetwork: false
hostIPC: false
hostPID: false
hostPorts: []
volumes:
- configMap
- downwardAPI
- emptyDir
- projected
- secretrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: mytest1
namespace: "mytest1"
labels: {}
rules:
- apiGroups: ['policy']
resources: ['podsecuritypolicies']
verbs: ['use']
resourceNames: ['00-mytest1']和rb.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: mytest1
namespace: "mytest1"
labels: {}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: mytest1
subjects:
- kind: ServiceAccount
name: default
namespace: "mytest1"我期望返回kubectl auth can-i ...检查的yes或no,而不是上面提到的错误。身份验证检查的用例是否正确?我感谢他的指正。
发布于 2021-09-13 11:10:14
您缺少标志--subresource。如果我执行
kubectl auth --as=system:serviceaccount:mytest1:default can-i use psp --subresource=00-mytest1我有明确的答案。在我的情况下:
no您还可以收到类似下面这样的警告:
Warning: resource 'podsecuritypolicies' is not namespace scoped in group 'policy'但它与您的配置直接相关。
有关kubectl auth can-i命令的更多信息,请查看
kubectl auth can-i --help在你的终端里。您还可以阅读this doc。
https://stackoverflow.com/questions/69119755
复制相似问题