123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475 |
- apiVersion: v1
- kind: ServiceAccount
- metadata:
- name: csi-mock
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-controller-attacher-role
- subjects:
- - kind: ServiceAccount
- name: csi-mock
- namespace: default
- roleRef:
- kind: ClusterRole
- name: external-attacher-runner
- apiGroup: rbac.authorization.k8s.io
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-controller-provisioner-role
- subjects:
- - kind: ServiceAccount
- name: csi-mock
- namespace: default
- roleRef:
- kind: ClusterRole
- name: external-provisioner-runner
- apiGroup: rbac.authorization.k8s.io
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-controller-cluster-driver-registrar-role
- subjects:
- - kind: ServiceAccount
- name: csi-mock
- namespace: default
- roleRef:
- kind: ClusterRole
- name: cluster-driver-registrar-runner
- apiGroup: rbac.authorization.k8s.io
- ---
- # priviledged Pod Security Policy, previously defined via PrivilegedTestPSPClusterRoleBinding()
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: psp-csi-controller-driver-registrar-role
- subjects:
- - kind: ServiceAccount
- name: csi-mock
- namespace: default
- roleRef:
- kind: ClusterRole
- name: e2e-test-privileged-psp
- apiGroup: rbac.authorization.k8s.io
- ---
- kind: ClusterRoleBinding
- apiVersion: rbac.authorization.k8s.io/v1
- metadata:
- name: csi-controller-resizer-role
- subjects:
- - kind: ServiceAccount
- name: csi-mock
- namespace: default
- roleRef:
- kind: ClusterRole
- name: external-resizer-runner
- apiGroup: rbac.authorization.k8s.io
|