controller-role-bindings.yaml 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. apiVersion: v1
  2. items:
  3. - apiVersion: rbac.authorization.k8s.io/v1
  4. kind: ClusterRoleBinding
  5. metadata:
  6. annotations:
  7. rbac.authorization.kubernetes.io/autoupdate: "true"
  8. creationTimestamp: null
  9. labels:
  10. kubernetes.io/bootstrapping: rbac-defaults
  11. name: system:controller:attachdetach-controller
  12. roleRef:
  13. apiGroup: rbac.authorization.k8s.io
  14. kind: ClusterRole
  15. name: system:controller:attachdetach-controller
  16. subjects:
  17. - kind: ServiceAccount
  18. name: attachdetach-controller
  19. namespace: kube-system
  20. - apiVersion: rbac.authorization.k8s.io/v1
  21. kind: ClusterRoleBinding
  22. metadata:
  23. annotations:
  24. rbac.authorization.kubernetes.io/autoupdate: "true"
  25. creationTimestamp: null
  26. labels:
  27. kubernetes.io/bootstrapping: rbac-defaults
  28. name: system:controller:certificate-controller
  29. roleRef:
  30. apiGroup: rbac.authorization.k8s.io
  31. kind: ClusterRole
  32. name: system:controller:certificate-controller
  33. subjects:
  34. - kind: ServiceAccount
  35. name: certificate-controller
  36. namespace: kube-system
  37. - apiVersion: rbac.authorization.k8s.io/v1
  38. kind: ClusterRoleBinding
  39. metadata:
  40. annotations:
  41. rbac.authorization.kubernetes.io/autoupdate: "true"
  42. creationTimestamp: null
  43. labels:
  44. kubernetes.io/bootstrapping: rbac-defaults
  45. name: system:controller:clusterrole-aggregation-controller
  46. roleRef:
  47. apiGroup: rbac.authorization.k8s.io
  48. kind: ClusterRole
  49. name: system:controller:clusterrole-aggregation-controller
  50. subjects:
  51. - kind: ServiceAccount
  52. name: clusterrole-aggregation-controller
  53. namespace: kube-system
  54. - apiVersion: rbac.authorization.k8s.io/v1
  55. kind: ClusterRoleBinding
  56. metadata:
  57. annotations:
  58. rbac.authorization.kubernetes.io/autoupdate: "true"
  59. creationTimestamp: null
  60. labels:
  61. kubernetes.io/bootstrapping: rbac-defaults
  62. name: system:controller:cronjob-controller
  63. roleRef:
  64. apiGroup: rbac.authorization.k8s.io
  65. kind: ClusterRole
  66. name: system:controller:cronjob-controller
  67. subjects:
  68. - kind: ServiceAccount
  69. name: cronjob-controller
  70. namespace: kube-system
  71. - apiVersion: rbac.authorization.k8s.io/v1
  72. kind: ClusterRoleBinding
  73. metadata:
  74. annotations:
  75. rbac.authorization.kubernetes.io/autoupdate: "true"
  76. creationTimestamp: null
  77. labels:
  78. kubernetes.io/bootstrapping: rbac-defaults
  79. name: system:controller:daemon-set-controller
  80. roleRef:
  81. apiGroup: rbac.authorization.k8s.io
  82. kind: ClusterRole
  83. name: system:controller:daemon-set-controller
  84. subjects:
  85. - kind: ServiceAccount
  86. name: daemon-set-controller
  87. namespace: kube-system
  88. - apiVersion: rbac.authorization.k8s.io/v1
  89. kind: ClusterRoleBinding
  90. metadata:
  91. annotations:
  92. rbac.authorization.kubernetes.io/autoupdate: "true"
  93. creationTimestamp: null
  94. labels:
  95. kubernetes.io/bootstrapping: rbac-defaults
  96. name: system:controller:deployment-controller
  97. roleRef:
  98. apiGroup: rbac.authorization.k8s.io
  99. kind: ClusterRole
  100. name: system:controller:deployment-controller
  101. subjects:
  102. - kind: ServiceAccount
  103. name: deployment-controller
  104. namespace: kube-system
  105. - apiVersion: rbac.authorization.k8s.io/v1
  106. kind: ClusterRoleBinding
  107. metadata:
  108. annotations:
  109. rbac.authorization.kubernetes.io/autoupdate: "true"
  110. creationTimestamp: null
  111. labels:
  112. kubernetes.io/bootstrapping: rbac-defaults
  113. name: system:controller:disruption-controller
  114. roleRef:
  115. apiGroup: rbac.authorization.k8s.io
  116. kind: ClusterRole
  117. name: system:controller:disruption-controller
  118. subjects:
  119. - kind: ServiceAccount
  120. name: disruption-controller
  121. namespace: kube-system
  122. - apiVersion: rbac.authorization.k8s.io/v1
  123. kind: ClusterRoleBinding
  124. metadata:
  125. annotations:
  126. rbac.authorization.kubernetes.io/autoupdate: "true"
  127. creationTimestamp: null
  128. labels:
  129. kubernetes.io/bootstrapping: rbac-defaults
  130. name: system:controller:endpoint-controller
  131. roleRef:
  132. apiGroup: rbac.authorization.k8s.io
  133. kind: ClusterRole
  134. name: system:controller:endpoint-controller
  135. subjects:
  136. - kind: ServiceAccount
  137. name: endpoint-controller
  138. namespace: kube-system
  139. - apiVersion: rbac.authorization.k8s.io/v1
  140. kind: ClusterRoleBinding
  141. metadata:
  142. annotations:
  143. rbac.authorization.kubernetes.io/autoupdate: "true"
  144. creationTimestamp: null
  145. labels:
  146. kubernetes.io/bootstrapping: rbac-defaults
  147. name: system:controller:endpointslice-controller
  148. roleRef:
  149. apiGroup: rbac.authorization.k8s.io
  150. kind: ClusterRole
  151. name: system:controller:endpointslice-controller
  152. subjects:
  153. - kind: ServiceAccount
  154. name: endpointslice-controller
  155. namespace: kube-system
  156. - apiVersion: rbac.authorization.k8s.io/v1
  157. kind: ClusterRoleBinding
  158. metadata:
  159. annotations:
  160. rbac.authorization.kubernetes.io/autoupdate: "true"
  161. creationTimestamp: null
  162. labels:
  163. kubernetes.io/bootstrapping: rbac-defaults
  164. name: system:controller:expand-controller
  165. roleRef:
  166. apiGroup: rbac.authorization.k8s.io
  167. kind: ClusterRole
  168. name: system:controller:expand-controller
  169. subjects:
  170. - kind: ServiceAccount
  171. name: expand-controller
  172. namespace: kube-system
  173. - apiVersion: rbac.authorization.k8s.io/v1
  174. kind: ClusterRoleBinding
  175. metadata:
  176. annotations:
  177. rbac.authorization.kubernetes.io/autoupdate: "true"
  178. creationTimestamp: null
  179. labels:
  180. kubernetes.io/bootstrapping: rbac-defaults
  181. name: system:controller:generic-garbage-collector
  182. roleRef:
  183. apiGroup: rbac.authorization.k8s.io
  184. kind: ClusterRole
  185. name: system:controller:generic-garbage-collector
  186. subjects:
  187. - kind: ServiceAccount
  188. name: generic-garbage-collector
  189. namespace: kube-system
  190. - apiVersion: rbac.authorization.k8s.io/v1
  191. kind: ClusterRoleBinding
  192. metadata:
  193. annotations:
  194. rbac.authorization.kubernetes.io/autoupdate: "true"
  195. creationTimestamp: null
  196. labels:
  197. kubernetes.io/bootstrapping: rbac-defaults
  198. name: system:controller:horizontal-pod-autoscaler
  199. roleRef:
  200. apiGroup: rbac.authorization.k8s.io
  201. kind: ClusterRole
  202. name: system:controller:horizontal-pod-autoscaler
  203. subjects:
  204. - kind: ServiceAccount
  205. name: horizontal-pod-autoscaler
  206. namespace: kube-system
  207. - apiVersion: rbac.authorization.k8s.io/v1
  208. kind: ClusterRoleBinding
  209. metadata:
  210. annotations:
  211. rbac.authorization.kubernetes.io/autoupdate: "true"
  212. creationTimestamp: null
  213. labels:
  214. kubernetes.io/bootstrapping: rbac-defaults
  215. name: system:controller:job-controller
  216. roleRef:
  217. apiGroup: rbac.authorization.k8s.io
  218. kind: ClusterRole
  219. name: system:controller:job-controller
  220. subjects:
  221. - kind: ServiceAccount
  222. name: job-controller
  223. namespace: kube-system
  224. - apiVersion: rbac.authorization.k8s.io/v1
  225. kind: ClusterRoleBinding
  226. metadata:
  227. annotations:
  228. rbac.authorization.kubernetes.io/autoupdate: "true"
  229. creationTimestamp: null
  230. labels:
  231. kubernetes.io/bootstrapping: rbac-defaults
  232. name: system:controller:namespace-controller
  233. roleRef:
  234. apiGroup: rbac.authorization.k8s.io
  235. kind: ClusterRole
  236. name: system:controller:namespace-controller
  237. subjects:
  238. - kind: ServiceAccount
  239. name: namespace-controller
  240. namespace: kube-system
  241. - apiVersion: rbac.authorization.k8s.io/v1
  242. kind: ClusterRoleBinding
  243. metadata:
  244. annotations:
  245. rbac.authorization.kubernetes.io/autoupdate: "true"
  246. creationTimestamp: null
  247. labels:
  248. kubernetes.io/bootstrapping: rbac-defaults
  249. name: system:controller:node-controller
  250. roleRef:
  251. apiGroup: rbac.authorization.k8s.io
  252. kind: ClusterRole
  253. name: system:controller:node-controller
  254. subjects:
  255. - kind: ServiceAccount
  256. name: node-controller
  257. namespace: kube-system
  258. - apiVersion: rbac.authorization.k8s.io/v1
  259. kind: ClusterRoleBinding
  260. metadata:
  261. annotations:
  262. rbac.authorization.kubernetes.io/autoupdate: "true"
  263. creationTimestamp: null
  264. labels:
  265. kubernetes.io/bootstrapping: rbac-defaults
  266. name: system:controller:persistent-volume-binder
  267. roleRef:
  268. apiGroup: rbac.authorization.k8s.io
  269. kind: ClusterRole
  270. name: system:controller:persistent-volume-binder
  271. subjects:
  272. - kind: ServiceAccount
  273. name: persistent-volume-binder
  274. namespace: kube-system
  275. - apiVersion: rbac.authorization.k8s.io/v1
  276. kind: ClusterRoleBinding
  277. metadata:
  278. annotations:
  279. rbac.authorization.kubernetes.io/autoupdate: "true"
  280. creationTimestamp: null
  281. labels:
  282. kubernetes.io/bootstrapping: rbac-defaults
  283. name: system:controller:pod-garbage-collector
  284. roleRef:
  285. apiGroup: rbac.authorization.k8s.io
  286. kind: ClusterRole
  287. name: system:controller:pod-garbage-collector
  288. subjects:
  289. - kind: ServiceAccount
  290. name: pod-garbage-collector
  291. namespace: kube-system
  292. - apiVersion: rbac.authorization.k8s.io/v1
  293. kind: ClusterRoleBinding
  294. metadata:
  295. annotations:
  296. rbac.authorization.kubernetes.io/autoupdate: "true"
  297. creationTimestamp: null
  298. labels:
  299. kubernetes.io/bootstrapping: rbac-defaults
  300. name: system:controller:pv-protection-controller
  301. roleRef:
  302. apiGroup: rbac.authorization.k8s.io
  303. kind: ClusterRole
  304. name: system:controller:pv-protection-controller
  305. subjects:
  306. - kind: ServiceAccount
  307. name: pv-protection-controller
  308. namespace: kube-system
  309. - apiVersion: rbac.authorization.k8s.io/v1
  310. kind: ClusterRoleBinding
  311. metadata:
  312. annotations:
  313. rbac.authorization.kubernetes.io/autoupdate: "true"
  314. creationTimestamp: null
  315. labels:
  316. kubernetes.io/bootstrapping: rbac-defaults
  317. name: system:controller:pvc-protection-controller
  318. roleRef:
  319. apiGroup: rbac.authorization.k8s.io
  320. kind: ClusterRole
  321. name: system:controller:pvc-protection-controller
  322. subjects:
  323. - kind: ServiceAccount
  324. name: pvc-protection-controller
  325. namespace: kube-system
  326. - apiVersion: rbac.authorization.k8s.io/v1
  327. kind: ClusterRoleBinding
  328. metadata:
  329. annotations:
  330. rbac.authorization.kubernetes.io/autoupdate: "true"
  331. creationTimestamp: null
  332. labels:
  333. kubernetes.io/bootstrapping: rbac-defaults
  334. name: system:controller:replicaset-controller
  335. roleRef:
  336. apiGroup: rbac.authorization.k8s.io
  337. kind: ClusterRole
  338. name: system:controller:replicaset-controller
  339. subjects:
  340. - kind: ServiceAccount
  341. name: replicaset-controller
  342. namespace: kube-system
  343. - apiVersion: rbac.authorization.k8s.io/v1
  344. kind: ClusterRoleBinding
  345. metadata:
  346. annotations:
  347. rbac.authorization.kubernetes.io/autoupdate: "true"
  348. creationTimestamp: null
  349. labels:
  350. kubernetes.io/bootstrapping: rbac-defaults
  351. name: system:controller:replication-controller
  352. roleRef:
  353. apiGroup: rbac.authorization.k8s.io
  354. kind: ClusterRole
  355. name: system:controller:replication-controller
  356. subjects:
  357. - kind: ServiceAccount
  358. name: replication-controller
  359. namespace: kube-system
  360. - apiVersion: rbac.authorization.k8s.io/v1
  361. kind: ClusterRoleBinding
  362. metadata:
  363. annotations:
  364. rbac.authorization.kubernetes.io/autoupdate: "true"
  365. creationTimestamp: null
  366. labels:
  367. kubernetes.io/bootstrapping: rbac-defaults
  368. name: system:controller:resourcequota-controller
  369. roleRef:
  370. apiGroup: rbac.authorization.k8s.io
  371. kind: ClusterRole
  372. name: system:controller:resourcequota-controller
  373. subjects:
  374. - kind: ServiceAccount
  375. name: resourcequota-controller
  376. namespace: kube-system
  377. - apiVersion: rbac.authorization.k8s.io/v1
  378. kind: ClusterRoleBinding
  379. metadata:
  380. annotations:
  381. rbac.authorization.kubernetes.io/autoupdate: "true"
  382. creationTimestamp: null
  383. labels:
  384. kubernetes.io/bootstrapping: rbac-defaults
  385. name: system:controller:route-controller
  386. roleRef:
  387. apiGroup: rbac.authorization.k8s.io
  388. kind: ClusterRole
  389. name: system:controller:route-controller
  390. subjects:
  391. - kind: ServiceAccount
  392. name: route-controller
  393. namespace: kube-system
  394. - apiVersion: rbac.authorization.k8s.io/v1
  395. kind: ClusterRoleBinding
  396. metadata:
  397. annotations:
  398. rbac.authorization.kubernetes.io/autoupdate: "true"
  399. creationTimestamp: null
  400. labels:
  401. kubernetes.io/bootstrapping: rbac-defaults
  402. name: system:controller:service-account-controller
  403. roleRef:
  404. apiGroup: rbac.authorization.k8s.io
  405. kind: ClusterRole
  406. name: system:controller:service-account-controller
  407. subjects:
  408. - kind: ServiceAccount
  409. name: service-account-controller
  410. namespace: kube-system
  411. - apiVersion: rbac.authorization.k8s.io/v1
  412. kind: ClusterRoleBinding
  413. metadata:
  414. annotations:
  415. rbac.authorization.kubernetes.io/autoupdate: "true"
  416. creationTimestamp: null
  417. labels:
  418. kubernetes.io/bootstrapping: rbac-defaults
  419. name: system:controller:service-controller
  420. roleRef:
  421. apiGroup: rbac.authorization.k8s.io
  422. kind: ClusterRole
  423. name: system:controller:service-controller
  424. subjects:
  425. - kind: ServiceAccount
  426. name: service-controller
  427. namespace: kube-system
  428. - apiVersion: rbac.authorization.k8s.io/v1
  429. kind: ClusterRoleBinding
  430. metadata:
  431. annotations:
  432. rbac.authorization.kubernetes.io/autoupdate: "true"
  433. creationTimestamp: null
  434. labels:
  435. kubernetes.io/bootstrapping: rbac-defaults
  436. name: system:controller:statefulset-controller
  437. roleRef:
  438. apiGroup: rbac.authorization.k8s.io
  439. kind: ClusterRole
  440. name: system:controller:statefulset-controller
  441. subjects:
  442. - kind: ServiceAccount
  443. name: statefulset-controller
  444. namespace: kube-system
  445. - apiVersion: rbac.authorization.k8s.io/v1
  446. kind: ClusterRoleBinding
  447. metadata:
  448. annotations:
  449. rbac.authorization.kubernetes.io/autoupdate: "true"
  450. creationTimestamp: null
  451. labels:
  452. kubernetes.io/bootstrapping: rbac-defaults
  453. name: system:controller:ttl-controller
  454. roleRef:
  455. apiGroup: rbac.authorization.k8s.io
  456. kind: ClusterRole
  457. name: system:controller:ttl-controller
  458. subjects:
  459. - kind: ServiceAccount
  460. name: ttl-controller
  461. namespace: kube-system
  462. kind: List
  463. metadata: {}