cluster-role-bindings.yaml 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. apiVersion: v1
  2. items:
  3. - apiVersion: rbac.authorization.k8s.io/v1
  4. kind: ClusterRoleBinding
  5. metadata:
  6. annotations:
  7. rbac.authorization.kubernetes.io/autoupdate: "true"
  8. creationTimestamp: null
  9. labels:
  10. kubernetes.io/bootstrapping: rbac-defaults
  11. name: cluster-admin
  12. roleRef:
  13. apiGroup: rbac.authorization.k8s.io
  14. kind: ClusterRole
  15. name: cluster-admin
  16. subjects:
  17. - apiGroup: rbac.authorization.k8s.io
  18. kind: Group
  19. name: system:masters
  20. - apiVersion: rbac.authorization.k8s.io/v1
  21. kind: ClusterRoleBinding
  22. metadata:
  23. annotations:
  24. rbac.authorization.kubernetes.io/autoupdate: "true"
  25. creationTimestamp: null
  26. labels:
  27. kubernetes.io/bootstrapping: rbac-defaults
  28. name: system:basic-user
  29. roleRef:
  30. apiGroup: rbac.authorization.k8s.io
  31. kind: ClusterRole
  32. name: system:basic-user
  33. subjects:
  34. - apiGroup: rbac.authorization.k8s.io
  35. kind: Group
  36. name: system:authenticated
  37. - apiVersion: rbac.authorization.k8s.io/v1
  38. kind: ClusterRoleBinding
  39. metadata:
  40. annotations:
  41. rbac.authorization.kubernetes.io/autoupdate: "true"
  42. creationTimestamp: null
  43. labels:
  44. kubernetes.io/bootstrapping: rbac-defaults
  45. name: system:discovery
  46. roleRef:
  47. apiGroup: rbac.authorization.k8s.io
  48. kind: ClusterRole
  49. name: system:discovery
  50. subjects:
  51. - apiGroup: rbac.authorization.k8s.io
  52. kind: Group
  53. name: system:authenticated
  54. - apiVersion: rbac.authorization.k8s.io/v1
  55. kind: ClusterRoleBinding
  56. metadata:
  57. annotations:
  58. rbac.authorization.kubernetes.io/autoupdate: "true"
  59. creationTimestamp: null
  60. labels:
  61. kubernetes.io/bootstrapping: rbac-defaults
  62. name: system:kube-controller-manager
  63. roleRef:
  64. apiGroup: rbac.authorization.k8s.io
  65. kind: ClusterRole
  66. name: system:kube-controller-manager
  67. subjects:
  68. - apiGroup: rbac.authorization.k8s.io
  69. kind: User
  70. name: system:kube-controller-manager
  71. - apiVersion: rbac.authorization.k8s.io/v1
  72. kind: ClusterRoleBinding
  73. metadata:
  74. annotations:
  75. rbac.authorization.kubernetes.io/autoupdate: "true"
  76. creationTimestamp: null
  77. labels:
  78. kubernetes.io/bootstrapping: rbac-defaults
  79. name: system:kube-dns
  80. roleRef:
  81. apiGroup: rbac.authorization.k8s.io
  82. kind: ClusterRole
  83. name: system:kube-dns
  84. subjects:
  85. - kind: ServiceAccount
  86. name: kube-dns
  87. namespace: kube-system
  88. - apiVersion: rbac.authorization.k8s.io/v1
  89. kind: ClusterRoleBinding
  90. metadata:
  91. annotations:
  92. rbac.authorization.kubernetes.io/autoupdate: "true"
  93. creationTimestamp: null
  94. labels:
  95. kubernetes.io/bootstrapping: rbac-defaults
  96. name: system:kube-scheduler
  97. roleRef:
  98. apiGroup: rbac.authorization.k8s.io
  99. kind: ClusterRole
  100. name: system:kube-scheduler
  101. subjects:
  102. - apiGroup: rbac.authorization.k8s.io
  103. kind: User
  104. name: system:kube-scheduler
  105. - apiVersion: rbac.authorization.k8s.io/v1
  106. kind: ClusterRoleBinding
  107. metadata:
  108. annotations:
  109. rbac.authorization.kubernetes.io/autoupdate: "true"
  110. creationTimestamp: null
  111. labels:
  112. kubernetes.io/bootstrapping: rbac-defaults
  113. name: system:node
  114. roleRef:
  115. apiGroup: rbac.authorization.k8s.io
  116. kind: ClusterRole
  117. name: system:node
  118. - apiVersion: rbac.authorization.k8s.io/v1
  119. kind: ClusterRoleBinding
  120. metadata:
  121. annotations:
  122. rbac.authorization.kubernetes.io/autoupdate: "true"
  123. creationTimestamp: null
  124. labels:
  125. kubernetes.io/bootstrapping: rbac-defaults
  126. name: system:node-proxier
  127. roleRef:
  128. apiGroup: rbac.authorization.k8s.io
  129. kind: ClusterRole
  130. name: system:node-proxier
  131. subjects:
  132. - apiGroup: rbac.authorization.k8s.io
  133. kind: User
  134. name: system:kube-proxy
  135. - apiVersion: rbac.authorization.k8s.io/v1
  136. kind: ClusterRoleBinding
  137. metadata:
  138. annotations:
  139. rbac.authorization.kubernetes.io/autoupdate: "true"
  140. creationTimestamp: null
  141. labels:
  142. kubernetes.io/bootstrapping: rbac-defaults
  143. name: system:public-info-viewer
  144. roleRef:
  145. apiGroup: rbac.authorization.k8s.io
  146. kind: ClusterRole
  147. name: system:public-info-viewer
  148. subjects:
  149. - apiGroup: rbac.authorization.k8s.io
  150. kind: Group
  151. name: system:authenticated
  152. - apiGroup: rbac.authorization.k8s.io
  153. kind: Group
  154. name: system:unauthenticated
  155. - apiVersion: rbac.authorization.k8s.io/v1
  156. kind: ClusterRoleBinding
  157. metadata:
  158. annotations:
  159. rbac.authorization.kubernetes.io/autoupdate: "true"
  160. creationTimestamp: null
  161. labels:
  162. kubernetes.io/bootstrapping: rbac-defaults
  163. name: system:volume-scheduler
  164. roleRef:
  165. apiGroup: rbac.authorization.k8s.io
  166. kind: ClusterRole
  167. name: system:volume-scheduler
  168. subjects:
  169. - apiGroup: rbac.authorization.k8s.io
  170. kind: User
  171. name: system:kube-scheduler
  172. kind: List
  173. metadata: {}