...

Text file src/k8s.io/kubernetes/cluster/addons/rbac/legacy-kubelet-user-disable/kubelet-binding.yaml

Documentation: k8s.io/kubernetes/cluster/addons/rbac/legacy-kubelet-user-disable

     1# This is required so that old clusters don't remove required bindings for 1.5
     2# kubelets to function.
     3apiVersion: rbac.authorization.k8s.io/v1
     4kind: ClusterRoleBinding
     5metadata:
     6  name: kubelet-cluster-admin
     7  labels:
     8    addonmanager.kubernetes.io/mode: EnsureExists
     9roleRef:
    10  apiGroup: rbac.authorization.k8s.io
    11  kind: ClusterRole
    12  name: system:node
    13subjects: []
    14---
    15# This is required so that new clusters still have bootstrap permissions
    16apiVersion: rbac.authorization.k8s.io/v1
    17kind: ClusterRoleBinding
    18metadata:
    19  name: kubelet-bootstrap
    20  labels:
    21    addonmanager.kubernetes.io/mode: Reconcile
    22roleRef:
    23  apiGroup: rbac.authorization.k8s.io
    24  kind: ClusterRole
    25  name: system:node-bootstrapper
    26subjects:
    27- apiGroup: rbac.authorization.k8s.io
    28  kind: User
    29  name: kubelet

View as plain text