kubelet-certificate-management.yaml 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. apiVersion: rbac.authorization.k8s.io/v1
  2. kind: ClusterRoleBinding
  3. metadata:
  4. name: gce:beta:kubelet-certificate-bootstrap
  5. labels:
  6. addonmanager.kubernetes.io/mode: Reconcile
  7. roleRef:
  8. apiGroup: rbac.authorization.k8s.io
  9. kind: ClusterRole
  10. name: gce:beta:kubelet-certificate-bootstrap
  11. subjects:
  12. - apiGroup: rbac.authorization.k8s.io
  13. kind: User
  14. name: kubelet
  15. ---
  16. apiVersion: rbac.authorization.k8s.io/v1
  17. kind: ClusterRoleBinding
  18. metadata:
  19. name: gce:beta:kubelet-certificate-rotation
  20. labels:
  21. addonmanager.kubernetes.io/mode: Reconcile
  22. roleRef:
  23. apiGroup: rbac.authorization.k8s.io
  24. kind: ClusterRole
  25. name: gce:beta:kubelet-certificate-rotation
  26. subjects:
  27. - apiGroup: rbac.authorization.k8s.io
  28. kind: Group
  29. name: system:nodes
  30. ---
  31. apiVersion: rbac.authorization.k8s.io/v1
  32. kind: ClusterRole
  33. metadata:
  34. name: gce:beta:kubelet-certificate-bootstrap
  35. labels:
  36. addonmanager.kubernetes.io/mode: Reconcile
  37. rules:
  38. - apiGroups:
  39. - "certificates.k8s.io"
  40. resources:
  41. - certificatesigningrequests/nodeclient
  42. verbs:
  43. - "create"
  44. ---
  45. apiVersion: rbac.authorization.k8s.io/v1
  46. kind: ClusterRole
  47. metadata:
  48. name: gce:beta:kubelet-certificate-rotation
  49. labels:
  50. addonmanager.kubernetes.io/mode: Reconcile
  51. rules:
  52. - apiGroups:
  53. - "certificates.k8s.io"
  54. resources:
  55. - certificatesigningrequests/selfnodeclient
  56. - certificatesigningrequests/selfnodeserver
  57. verbs:
  58. - "create"