kubectl-user-authentication-authorization
weight: 87
title: 创建用户认证授权的kubeconfig 文件
date: ‘2022-05-21T00:00:00+08:00’
type: book
当我们安装好集群后,如果想要把
下面以创建一个
创建CA 证书和秘钥
创建 devuser-csr.json
文件
{
"CN": "devuser",
"hosts": [],
"key": {
"algo": "rsa",
"size": 2048
},
"names": [
{
"C": "CN",
"ST": "BeiJing",
"L": "BeiJing",
"O": "k8s",
"OU": "System"
}
]
}
生成
下面我们在/etc/kubernetes/ssl
目录下执行以下命令:
执行该命令前请先确保该目录下已经包含如下文件:
ca-key.pem ca.pem ca-config.json devuser-csr.json
$ cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=ca-config.json -profile=kubernetes devuser-csr.json | cfssljson -bare devuser
2017/08/31 13:31:54 [INFO] generate received request
2017/08/31 13:31:54 [INFO] received CSR
2017/08/31 13:31:54 [INFO] generating key: rsa-2048
2017/08/31 13:31:55 [INFO] encoded CSR
2017/08/31 13:31:55 [INFO] signed certificate with serial number 43372632012323103879829229080989286813242051309
2017/08/31 13:31:55 [WARNING] This certificate lacks a "hosts" field. This makes it unsuitable for
websites. For more information see the Baseline Requirements for the Issuance and Management
of Publicly-Trusted Certificates, v.1.1.6, from the CA/Browser Forum (https://cabforum.org);
specifically, section 10.2.3 ("Information Requirements").
这将生成如下文件:
devuser.csr devuser-key.pem devuser.pem
创建kubeconfig 文件
# 设置集群参数
export KUBE_APISERVER="https://172.20.0.113:6443"
kubectl config set-cluster kubernetes \
--certificate-authority=/etc/kubernetes/ssl/ca.pem \
--embed-certs=true \
--server=${KUBE_APISERVER} \
--kubeconfig=devuser.kubeconfig
# 设置客户端认证参数
kubectl config set-credentials devuser \
--client-certificate=/etc/kubernetes/ssl/devuser.pem \
--client-key=/etc/kubernetes/ssl/devuser-key.pem \
--embed-certs=true \
--kubeconfig=devuser.kubeconfig
# 设置上下文参数
kubectl config set-context kubernetes \
--cluster=kubernetes \
--user=devuser \
--namespace=dev \
--kubeconfig=devuser.kubeconfig
# 设置默认上下文
kubectl config use-context kubernetes --kubeconfig=devuser.kubeconfig
我们现在查看
kubectl config get-contexts
CURRENT NAME CLUSTER AUTHINFO NAMESPACE
* kubernetes kubernetes admin
default-context default-cluster default-admin
显示的用户仍然是$HOME/.kube/config
文件作为了默认的devuser.kubeconfig
文件替换即可。
cp -f ./devuser.kubeconfig /root/.kube/config
RoleBinding
如果我们想限制
kubectl create rolebinding devuser-admin-binding --clusterrole=admin --user=devuser --namespace=dev
kubectl create rolebinding devuser-admin-binding --clusterrole=admin --user=devuser --namespace=test
这样
让我们来验证以下,现在我们在执行:
# 获取当前的 context
kubectl config get-contexts
CURRENT NAME CLUSTER AUTHINFO NAMESPACE
* kubernetes kubernetes devuser dev
* kubernetes kubernetes devuser test
# 无法访问 default namespace
kubectl get pods --namespace default
Error from server (Forbidden): User "devuser" cannot list pods in the namespace "default". (get pods)
# 默认访问的是 dev namespace,您也可以重新设置 context 让其默认访问 test namespace
kubectl get pods
No resources found.
现在
关于角色绑定的更多信息请参考 基于角色的访问控制。