A kubectl
plugin to generate roles and ClusterRoles based on kubectl interactions
Say you want to run a script inside your cluster with a ServiceAccount, and want to know which RBAC is necessary for it.
For example, if the script should do the following:
kubectl run -n default curl --image=curlimages/curl --command sleep 30h
kubectl wait --for=condition=ready pod curl
kubectl exec -n default curl -- curl -s http://platform:8080
kubectl delete pod curl -n default
kubectl get deployment -A
By running the commands with the gen-role plugin on your local machine, the necessary RBAC will be accumulated in the files gen-role.yaml
and gen-clusterrole.yaml
.
kubectl gen-role run -n default curl --image=curlimages/curl --command sleep 30h
kubectl gen-role wait --for=condition=ready pod curl
kubectl gen-role exec -n default curl -- curl -s http://platform:8080
kubectl gen-role delete pod curl -n default
kubectl gen-role get deployment -A
The the RBAC files will be populated as follows:
$ tail -n +1 gen*.yaml
==> gen-cluster-role.yaml <==
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
creationTimestamp: null
name: gen-role-generated-clusterrole
namespace: gen-role-generated-clusterrole
rules:
- apiGroups:
- apps/v1
resourceNames:
- deployments
verbs:
- list
==> gen-role.yaml <==
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
creationTimestamp: null
name: gen-role-generated-role
namespace: gen-role-generated-role
rules:
- apiGroups:
- ""
resourceNames:
- pods
verbs:
- post
- get
- list
- watch
- delete
All you need to do is bind them to the right ServiceAccount in the cluster.
Clone this repo and run
make bin
sudo make install
Use it with any kubectl command:
kubectl gen-role get po
The default is that the binary will be installed in /usr/local/bin
.
To change the destination, set the BINDIR
variable:
make bin
sudo make install BINDIR=/home/me/bin
However, the binary needs to be available in the PATH
to be recognized as a kubectl plugin.