rulevalidation.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. /*
  2. Copyright 2016 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package validation
  14. import (
  15. "errors"
  16. "fmt"
  17. "github.com/golang/glog"
  18. "k8s.io/kubernetes/pkg/api"
  19. apierrors "k8s.io/kubernetes/pkg/api/errors"
  20. "k8s.io/kubernetes/pkg/apis/rbac"
  21. "k8s.io/kubernetes/pkg/auth/user"
  22. "k8s.io/kubernetes/pkg/serviceaccount"
  23. utilerrors "k8s.io/kubernetes/pkg/util/errors"
  24. )
  25. type AuthorizationRuleResolver interface {
  26. // GetRoleReferenceRules attempts to resolve the role reference of a RoleBinding or ClusterRoleBinding. The passed namespace should be the namepsace
  27. // of the role binding, the empty string if a cluster role binding.
  28. GetRoleReferenceRules(ctx api.Context, roleRef api.ObjectReference, namespace string) ([]rbac.PolicyRule, error)
  29. // GetEffectivePolicyRules returns the list of rules that apply to a given user in a given namespace and error. If an error is returned, the slice of
  30. // PolicyRules may not be complete, but it contains all retrievable rules. This is done because policy rules are purely additive and policy determinations
  31. // can be made on the basis of those rules that are found.
  32. GetEffectivePolicyRules(ctx api.Context) ([]rbac.PolicyRule, error)
  33. }
  34. // ConfirmNoEscalation determines if the roles for a given user in a given namespace encompass the provided role.
  35. func ConfirmNoEscalation(ctx api.Context, ruleResolver AuthorizationRuleResolver, rules []rbac.PolicyRule) error {
  36. ruleResolutionErrors := []error{}
  37. ownerLocalRules, err := ruleResolver.GetEffectivePolicyRules(ctx)
  38. if err != nil {
  39. // As per AuthorizationRuleResolver contract, this may return a non fatal error with an incomplete list of policies. Log the error and continue.
  40. user, _ := api.UserFrom(ctx)
  41. glog.V(1).Infof("non-fatal error getting local rules for %v: %v", user, err)
  42. ruleResolutionErrors = append(ruleResolutionErrors, err)
  43. }
  44. masterContext := api.WithNamespace(ctx, "")
  45. ownerGlobalRules, err := ruleResolver.GetEffectivePolicyRules(masterContext)
  46. if err != nil {
  47. // Same case as above. Log error, don't fail.
  48. user, _ := api.UserFrom(ctx)
  49. glog.V(1).Infof("non-fatal error getting global rules for %v: %v", user, err)
  50. ruleResolutionErrors = append(ruleResolutionErrors, err)
  51. }
  52. ownerRules := make([]rbac.PolicyRule, 0, len(ownerGlobalRules)+len(ownerLocalRules))
  53. ownerRules = append(ownerRules, ownerLocalRules...)
  54. ownerRules = append(ownerRules, ownerGlobalRules...)
  55. ownerRightsCover, missingRights := Covers(ownerRules, rules)
  56. if !ownerRightsCover {
  57. user, _ := api.UserFrom(ctx)
  58. return apierrors.NewUnauthorized(fmt.Sprintf("attempt to grant extra privileges: %v user=%v ownerrules=%v ruleResolutionErrors=%v", missingRights, user, ownerRules, ruleResolutionErrors))
  59. }
  60. return nil
  61. }
  62. type DefaultRuleResolver struct {
  63. roleGetter RoleGetter
  64. roleBindingLister RoleBindingLister
  65. clusterRoleGetter ClusterRoleGetter
  66. clusterRoleBindingLister ClusterRoleBindingLister
  67. }
  68. func NewDefaultRuleResolver(roleGetter RoleGetter, roleBindingLister RoleBindingLister, clusterRoleGetter ClusterRoleGetter, clusterRoleBindingLister ClusterRoleBindingLister) *DefaultRuleResolver {
  69. return &DefaultRuleResolver{roleGetter, roleBindingLister, clusterRoleGetter, clusterRoleBindingLister}
  70. }
  71. type RoleGetter interface {
  72. GetRole(ctx api.Context, id string) (*rbac.Role, error)
  73. }
  74. type RoleBindingLister interface {
  75. ListRoleBindings(ctx api.Context, options *api.ListOptions) (*rbac.RoleBindingList, error)
  76. }
  77. type ClusterRoleGetter interface {
  78. GetClusterRole(ctx api.Context, id string) (*rbac.ClusterRole, error)
  79. }
  80. type ClusterRoleBindingLister interface {
  81. ListClusterRoleBindings(ctx api.Context, options *api.ListOptions) (*rbac.ClusterRoleBindingList, error)
  82. }
  83. // GetRoleReferenceRules attempts resolve the RoleBinding or ClusterRoleBinding.
  84. func (r *DefaultRuleResolver) GetRoleReferenceRules(ctx api.Context, roleRef api.ObjectReference, bindingNamespace string) ([]rbac.PolicyRule, error) {
  85. switch roleRef.Kind {
  86. case "Role":
  87. // Roles can only be referenced by RoleBindings within the same namespace.
  88. if len(bindingNamespace) == 0 {
  89. return nil, fmt.Errorf("cluster role binding references role %q in namespace %q", roleRef.Name, roleRef.Namespace)
  90. } else {
  91. if bindingNamespace != roleRef.Namespace {
  92. return nil, fmt.Errorf("role binding in namespace %q references role %q in namespace %q", bindingNamespace, roleRef.Name, roleRef.Namespace)
  93. }
  94. }
  95. role, err := r.roleGetter.GetRole(api.WithNamespace(ctx, roleRef.Namespace), roleRef.Name)
  96. if err != nil {
  97. return nil, err
  98. }
  99. return role.Rules, nil
  100. case "ClusterRole":
  101. clusterRole, err := r.clusterRoleGetter.GetClusterRole(api.WithNamespace(ctx, ""), roleRef.Name)
  102. if err != nil {
  103. return nil, err
  104. }
  105. return clusterRole.Rules, nil
  106. default:
  107. return nil, fmt.Errorf("unsupported role reference kind: %q", roleRef.Kind)
  108. }
  109. }
  110. func (r *DefaultRuleResolver) GetEffectivePolicyRules(ctx api.Context) ([]rbac.PolicyRule, error) {
  111. policyRules := []rbac.PolicyRule{}
  112. errorlist := []error{}
  113. if namespace := api.NamespaceValue(ctx); len(namespace) == 0 {
  114. clusterRoleBindings, err := r.clusterRoleBindingLister.ListClusterRoleBindings(ctx, &api.ListOptions{})
  115. if err != nil {
  116. return nil, err
  117. }
  118. for _, clusterRoleBinding := range clusterRoleBindings.Items {
  119. if ok, err := appliesTo(ctx, clusterRoleBinding.Subjects); err != nil {
  120. errorlist = append(errorlist, err)
  121. } else if !ok {
  122. continue
  123. }
  124. rules, err := r.GetRoleReferenceRules(ctx, clusterRoleBinding.RoleRef, namespace)
  125. if err != nil {
  126. errorlist = append(errorlist, err)
  127. continue
  128. }
  129. policyRules = append(policyRules, rules...)
  130. }
  131. } else {
  132. roleBindings, err := r.roleBindingLister.ListRoleBindings(ctx, &api.ListOptions{})
  133. if err != nil {
  134. return nil, err
  135. }
  136. for _, roleBinding := range roleBindings.Items {
  137. if ok, err := appliesTo(ctx, roleBinding.Subjects); err != nil {
  138. errorlist = append(errorlist, err)
  139. } else if !ok {
  140. continue
  141. }
  142. rules, err := r.GetRoleReferenceRules(ctx, roleBinding.RoleRef, namespace)
  143. if err != nil {
  144. errorlist = append(errorlist, err)
  145. continue
  146. }
  147. policyRules = append(policyRules, rules...)
  148. }
  149. }
  150. if len(errorlist) != 0 {
  151. return policyRules, utilerrors.NewAggregate(errorlist)
  152. }
  153. return policyRules, nil
  154. }
  155. func appliesTo(ctx api.Context, subjects []rbac.Subject) (bool, error) {
  156. user, ok := api.UserFrom(ctx)
  157. if !ok {
  158. return false, fmt.Errorf("no user data associated with context")
  159. }
  160. for _, subject := range subjects {
  161. if ok, err := appliesToUser(user, subject); err != nil || ok {
  162. return ok, err
  163. }
  164. }
  165. return false, nil
  166. }
  167. func appliesToUser(user user.Info, subject rbac.Subject) (bool, error) {
  168. switch subject.Kind {
  169. case rbac.UserKind:
  170. return subject.Name == rbac.UserAll || user.GetName() == subject.Name, nil
  171. case rbac.GroupKind:
  172. return has(user.GetGroups(), subject.Name), nil
  173. case rbac.ServiceAccountKind:
  174. if subject.Namespace == "" {
  175. return false, fmt.Errorf("subject of kind service account without specified namespace")
  176. }
  177. return serviceaccount.MakeUsername(subject.Namespace, subject.Name) == user.GetName(), nil
  178. default:
  179. return false, fmt.Errorf("unknown subject kind: %s", subject.Kind)
  180. }
  181. }
  182. // NewTestRuleResolver returns a rule resolver from lists of role objects.
  183. func NewTestRuleResolver(roles []rbac.Role, roleBindings []rbac.RoleBinding, clusterRoles []rbac.ClusterRole, clusterRoleBindings []rbac.ClusterRoleBinding) AuthorizationRuleResolver {
  184. r := staticRoles{
  185. roles: roles,
  186. roleBindings: roleBindings,
  187. clusterRoles: clusterRoles,
  188. clusterRoleBindings: clusterRoleBindings,
  189. }
  190. return newMockRuleResolver(&r)
  191. }
  192. func newMockRuleResolver(r *staticRoles) AuthorizationRuleResolver {
  193. return NewDefaultRuleResolver(r, r, r, r)
  194. }
  195. type staticRoles struct {
  196. roles []rbac.Role
  197. roleBindings []rbac.RoleBinding
  198. clusterRoles []rbac.ClusterRole
  199. clusterRoleBindings []rbac.ClusterRoleBinding
  200. }
  201. func (r *staticRoles) GetRole(ctx api.Context, id string) (*rbac.Role, error) {
  202. namespace, ok := api.NamespaceFrom(ctx)
  203. if !ok || namespace == "" {
  204. return nil, errors.New("must provide namespace when getting role")
  205. }
  206. for _, role := range r.roles {
  207. if role.Namespace == namespace && role.Name == id {
  208. return &role, nil
  209. }
  210. }
  211. return nil, errors.New("role not found")
  212. }
  213. func (r *staticRoles) GetClusterRole(ctx api.Context, id string) (*rbac.ClusterRole, error) {
  214. namespace, ok := api.NamespaceFrom(ctx)
  215. if ok && namespace != "" {
  216. return nil, errors.New("cannot provide namespace when getting cluster role")
  217. }
  218. for _, clusterRole := range r.clusterRoles {
  219. if clusterRole.Namespace == namespace && clusterRole.Name == id {
  220. return &clusterRole, nil
  221. }
  222. }
  223. return nil, errors.New("role not found")
  224. }
  225. func (r *staticRoles) ListRoleBindings(ctx api.Context, options *api.ListOptions) (*rbac.RoleBindingList, error) {
  226. namespace, ok := api.NamespaceFrom(ctx)
  227. if !ok || namespace == "" {
  228. return nil, errors.New("must provide namespace when listing role bindings")
  229. }
  230. roleBindingList := new(rbac.RoleBindingList)
  231. for _, roleBinding := range r.roleBindings {
  232. if roleBinding.Namespace != namespace {
  233. continue
  234. }
  235. // TODO(ericchiang): need to implement label selectors?
  236. roleBindingList.Items = append(roleBindingList.Items, roleBinding)
  237. }
  238. return roleBindingList, nil
  239. }
  240. func (r *staticRoles) ListClusterRoleBindings(ctx api.Context, options *api.ListOptions) (*rbac.ClusterRoleBindingList, error) {
  241. namespace, ok := api.NamespaceFrom(ctx)
  242. if ok && namespace != "" {
  243. return nil, errors.New("cannot list cluster role bindings from within a namespace")
  244. }
  245. clusterRoleBindings := new(rbac.ClusterRoleBindingList)
  246. clusterRoleBindings.Items = make([]rbac.ClusterRoleBinding, len(r.clusterRoleBindings))
  247. copy(clusterRoleBindings.Items, r.clusterRoleBindings)
  248. return clusterRoleBindings, nil
  249. }