You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`SelfSubjectAccessReview` is part of the `authorization.k8s.io` API group, which
255
286
exposes the API server authorization to external services. Other resources in
256
287
this group include:
257
288
258
-
* `SubjectAccessReview` - Access review for any user, not just the current one. Useful for delegating authorization decisions to the API server. For example, the kubelet and extension API servers use this to determine user access to their own APIs.
289
+
* `SubjectAccessReview` - Access review for any user, not only the current one. Useful for delegating authorization decisions to the API server. For example, the kubelet and extension API servers use this to determine user access to their own APIs.
259
290
* `LocalSubjectAccessReview` - Like `SubjectAccessReview` but restricted to a specific namespace.
260
291
* `SelfSubjectRulesReview` - A review which returns the set of actions a user can perform within a namespace. Useful for users to quickly summarize their own access, or for UIs to hide/show actions.
261
292
@@ -352,36 +383,64 @@ so an earlier module has higher priority to allow or deny a request.
352
383
或拒绝请求。
353
384
354
385
<!--
355
-
## Privilege escalation via pod creation
386
+
## Privilege escalation via workload creation or edits {#privilege-escalation-via-pod-creation}
356
387
357
-
Users who have the ability to create pods in a namespace can potentially
358
-
escalate their privileges within that namespace. They can create pods that
359
-
access their privileges within that namespace. They can create pods that access
360
-
secrets the user cannot themselves read, or that run under a service account
361
-
with different/greater permissions.
388
+
Users who can create/edit pods in a namespace, either directly or through a [controller](/docs/concepts/architecture/controller/)
389
+
such as an operator, could escalate their privileges in that namespace.
ClusterRole 来允许某特定用户执行 `kubectl get pods --all-namespaces`
163
+
* 跨名字空间访问的名字空间作用域的资源(如 Pods)
164
+
165
+
比如,你可以使用 ClusterRole 来允许某特定用户执行 `kubectl get pods --all-namespaces`
164
166
165
167
<!--
166
168
Here is an example of a ClusterRole that can be used to grant read access to
@@ -429,11 +431,16 @@ rules:
429
431
430
432
{{< note >}}
431
433
<!--
432
-
You cannot restrict `create` or `deletecollection` requests by resourceName. For `create`, this
433
-
limitation is because the object name is not known at authorization time.
434
+
You cannot restrict `create` or `deletecollection` requests by their resource name.
435
+
For `create`, this limitation is because the name of the new object may not be known at authorization time.
436
+
If you restrict `list` or `watch` by resourceName, clients must include a `metadata.name` field selector in their `list` or `watch` request that matches the specified resourceName in order to be authorized.
437
+
For example, `kubectl get configmaps --field-selector=metadata.name=my-configmap`
0 commit comments