kubelet-certificate-management.yaml 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. apiVersion: rbac.authorization.k8s.io/v1
  2. kind: ClusterRoleBinding
  3. metadata:
  4. name: gce:beta:kubelet-certificate-bootstrap
  5. labels:
  6. kubernetes.io/cluster-service: "true"
  7. addonmanager.kubernetes.io/mode: Reconcile
  8. roleRef:
  9. apiGroup: rbac.authorization.k8s.io
  10. kind: ClusterRole
  11. name: gce:beta:kubelet-certificate-bootstrap
  12. subjects:
  13. - apiGroup: rbac.authorization.k8s.io
  14. kind: User
  15. name: kubelet
  16. ---
  17. apiVersion: rbac.authorization.k8s.io/v1
  18. kind: ClusterRoleBinding
  19. metadata:
  20. name: gce:beta:kubelet-certificate-rotation
  21. labels:
  22. kubernetes.io/cluster-service: "true"
  23. addonmanager.kubernetes.io/mode: Reconcile
  24. roleRef:
  25. apiGroup: rbac.authorization.k8s.io
  26. kind: ClusterRole
  27. name: gce:beta:kubelet-certificate-rotation
  28. subjects:
  29. - apiGroup: rbac.authorization.k8s.io
  30. kind: Group
  31. name: system:nodes
  32. ---
  33. apiVersion: rbac.authorization.k8s.io/v1
  34. kind: ClusterRole
  35. metadata:
  36. name: gce:beta:kubelet-certificate-bootstrap
  37. labels:
  38. kubernetes.io/cluster-service: "true"
  39. addonmanager.kubernetes.io/mode: Reconcile
  40. rules:
  41. - apiGroups:
  42. - "certificates.k8s.io"
  43. resources:
  44. - certificatesigningrequests/nodeclient
  45. verbs:
  46. - "create"
  47. ---
  48. apiVersion: rbac.authorization.k8s.io/v1
  49. kind: ClusterRole
  50. metadata:
  51. name: gce:beta:kubelet-certificate-rotation
  52. labels:
  53. kubernetes.io/cluster-service: "true"
  54. addonmanager.kubernetes.io/mode: Reconcile
  55. rules:
  56. - apiGroups:
  57. - "certificates.k8s.io"
  58. resources:
  59. - certificatesigningrequests/selfnodeclient
  60. - certificatesigningrequests/selfnodeserver
  61. verbs:
  62. - "create"