namespace-role-bindings.yaml 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. apiVersion: v1
  2. items:
  3. - apiVersion: rbac.authorization.k8s.io/v1
  4. kind: RoleBinding
  5. metadata:
  6. annotations:
  7. rbac.authorization.kubernetes.io/autoupdate: "true"
  8. creationTimestamp: null
  9. labels:
  10. kubernetes.io/bootstrapping: rbac-defaults
  11. name: system:controller:bootstrap-signer
  12. namespace: kube-public
  13. roleRef:
  14. apiGroup: rbac.authorization.k8s.io
  15. kind: Role
  16. name: system:controller:bootstrap-signer
  17. subjects:
  18. - kind: ServiceAccount
  19. name: bootstrap-signer
  20. namespace: kube-system
  21. - apiVersion: rbac.authorization.k8s.io/v1
  22. kind: RoleBinding
  23. metadata:
  24. annotations:
  25. rbac.authorization.kubernetes.io/autoupdate: "true"
  26. creationTimestamp: null
  27. labels:
  28. kubernetes.io/bootstrapping: rbac-defaults
  29. name: system::extension-apiserver-authentication-reader
  30. namespace: kube-system
  31. roleRef:
  32. apiGroup: rbac.authorization.k8s.io
  33. kind: Role
  34. name: extension-apiserver-authentication-reader
  35. subjects:
  36. - apiGroup: rbac.authorization.k8s.io
  37. kind: User
  38. name: system:kube-controller-manager
  39. - apiGroup: rbac.authorization.k8s.io
  40. kind: User
  41. name: system:kube-scheduler
  42. - apiVersion: rbac.authorization.k8s.io/v1
  43. kind: RoleBinding
  44. metadata:
  45. annotations:
  46. rbac.authorization.kubernetes.io/autoupdate: "true"
  47. creationTimestamp: null
  48. labels:
  49. kubernetes.io/bootstrapping: rbac-defaults
  50. name: system::leader-locking-kube-controller-manager
  51. namespace: kube-system
  52. roleRef:
  53. apiGroup: rbac.authorization.k8s.io
  54. kind: Role
  55. name: system::leader-locking-kube-controller-manager
  56. subjects:
  57. - apiGroup: rbac.authorization.k8s.io
  58. kind: User
  59. name: system:kube-controller-manager
  60. - kind: ServiceAccount
  61. name: kube-controller-manager
  62. namespace: kube-system
  63. - apiVersion: rbac.authorization.k8s.io/v1
  64. kind: RoleBinding
  65. metadata:
  66. annotations:
  67. rbac.authorization.kubernetes.io/autoupdate: "true"
  68. creationTimestamp: null
  69. labels:
  70. kubernetes.io/bootstrapping: rbac-defaults
  71. name: system::leader-locking-kube-scheduler
  72. namespace: kube-system
  73. roleRef:
  74. apiGroup: rbac.authorization.k8s.io
  75. kind: Role
  76. name: system::leader-locking-kube-scheduler
  77. subjects:
  78. - apiGroup: rbac.authorization.k8s.io
  79. kind: User
  80. name: system:kube-scheduler
  81. - kind: ServiceAccount
  82. name: kube-scheduler
  83. namespace: kube-system
  84. - apiVersion: rbac.authorization.k8s.io/v1
  85. kind: RoleBinding
  86. metadata:
  87. annotations:
  88. rbac.authorization.kubernetes.io/autoupdate: "true"
  89. creationTimestamp: null
  90. labels:
  91. kubernetes.io/bootstrapping: rbac-defaults
  92. name: system:controller:bootstrap-signer
  93. namespace: kube-system
  94. roleRef:
  95. apiGroup: rbac.authorization.k8s.io
  96. kind: Role
  97. name: system:controller:bootstrap-signer
  98. subjects:
  99. - kind: ServiceAccount
  100. name: bootstrap-signer
  101. namespace: kube-system
  102. - apiVersion: rbac.authorization.k8s.io/v1
  103. kind: RoleBinding
  104. metadata:
  105. annotations:
  106. rbac.authorization.kubernetes.io/autoupdate: "true"
  107. creationTimestamp: null
  108. labels:
  109. kubernetes.io/bootstrapping: rbac-defaults
  110. name: system:controller:cloud-provider
  111. namespace: kube-system
  112. roleRef:
  113. apiGroup: rbac.authorization.k8s.io
  114. kind: Role
  115. name: system:controller:cloud-provider
  116. subjects:
  117. - kind: ServiceAccount
  118. name: cloud-provider
  119. namespace: kube-system
  120. - apiVersion: rbac.authorization.k8s.io/v1
  121. kind: RoleBinding
  122. metadata:
  123. annotations:
  124. rbac.authorization.kubernetes.io/autoupdate: "true"
  125. creationTimestamp: null
  126. labels:
  127. kubernetes.io/bootstrapping: rbac-defaults
  128. name: system:controller:token-cleaner
  129. namespace: kube-system
  130. roleRef:
  131. apiGroup: rbac.authorization.k8s.io
  132. kind: Role
  133. name: system:controller:token-cleaner
  134. subjects:
  135. - kind: ServiceAccount
  136. name: token-cleaner
  137. namespace: kube-system
  138. kind: List
  139. metadata: {}