You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Using wildcards in resource and verb entries could result in
589
-
overly permissive access being granted to sensitive resources.
590
+
Using wildcards in resource and verb entries could result in overly permissive access being granted
591
+
to sensitive resources.
590
592
For instance, if a new resource type is added, or a new subresource is added,
591
-
or a new custom verb is checked, the wildcard entry automatically grants access,
592
-
which may be undesirable.
593
+
or a new custom verb is checked, the wildcard entry automatically grants access, which may be undesirable.
593
594
The [principle of least privilege](/docs/concepts/security/rbac-good-practices/#least-privilege)
594
-
should be employed, using specific resources and verbs to ensure
595
-
only the permissions required for the workload to function correctly are applied.
595
+
should be employed, using specific resources and verbs to ensure only the permissions required for the
596
+
workload to function correctly are applied.
596
597
-->
597
598
在 resources 和 verbs 条目中使用通配符会为敏感资源授予过多的访问权限。
598
599
例如,如果添加了新的资源类型、新的子资源或新的自定义动词,
@@ -953,7 +954,7 @@ Subjects can be groups, users or
953
954
954
955
Kubernetes represents usernames as strings.
955
956
These can be: plain names, such as "alice"; email-style names, like "[email protected]";
956
-
or numeric user IDs represented as a string. It is up to you as a cluster administrator
957
+
or numeric user IDs represented as a string. It is up to you as a cluster administrator
957
958
to configure the [authentication modules](/docs/reference/access-authn-authz/authentication/)
958
959
so that authentication produces usernames in the format you want.
959
960
-->
@@ -1168,7 +1169,10 @@ Auto-reconciliation is enabled by default if the RBAC authorizer is active.
1168
1169
<!--
1169
1170
### API discovery roles {#discovery-roles}
1170
1171
1171
-
Default role bindings authorize unauthenticated and authenticated users to read API information that is deemed safe to be publicly accessible (including CustomResourceDefinitions). To disable anonymous unauthenticated access, add `--anonymous-auth=false` to the API server configuration.
1172
+
Default role bindings authorize unauthenticated and authenticated users to read API information
1173
+
that is deemed safe to be publicly accessible (including CustomResourceDefinitions).
1174
+
To disable anonymous unauthenticated access, add `--anonymous-auth=false` to
1175
+
the API server configuration.
1172
1176
1173
1177
To view the configuration of these roles via `kubectl` run:
1174
1178
-->
@@ -1717,8 +1721,9 @@ RBAC API 会阻止用户通过编辑角色或者角色绑定来提升权限。
1717
1721
You can only create/update a role if at least one of the following things is true:
1718
1722
1719
1723
1. You already have all the permissions contained in the role, at the same scope as the object being modified
1720
-
(cluster-wide for a ClusterRole, within the same namespace or cluster-wide for a Role).
1721
-
2. You are granted explicit permission to perform the `escalate` verb on the `roles` or `clusterroles` resource in the `rbac.authorization.k8s.io` API group.
1724
+
(cluster-wide for a ClusterRole, within the same namespace or cluster-wide for a Role).
1725
+
2. You are granted explicit permission to perform the `escalate` verb on the `roles` or
1726
+
`clusterroles`resource in the `rbac.authorization.k8s.io` API group.
@@ -1735,8 +1740,11 @@ containing that permission. To allow a user to create/update roles:
1735
1740
1736
1741
1. Grant them a role that allows them to create/update Role or ClusterRole objects, as desired.
1737
1742
2. Grant them permission to include specific permissions in the roles they create/update:
1738
-
* implicitly, by giving them those permissions (if they attempt to create or modify a Role or ClusterRole with permissions they themselves have not been granted, the API request will be forbidden)
1739
-
* or explicitly allow specifying any permission in a `Role` or `ClusterRole` by giving them permission to perform the `escalate` verb on `roles` or `clusterroles` resources in the `rbac.authorization.k8s.io` API group
1743
+
* implicitly, by giving them those permissions (if they attempt to create or modify a Role or
1744
+
ClusterRole with permissions they themselves have not been granted, the API request will be forbidden)
1745
+
* or explicitly allow specifying any permission in a `Role` or `ClusterRole` by giving them
1746
+
permission to perform the `escalate` verb on `roles` or `clusterroles` resources in the
0 commit comments