...

Text file src/k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml

Documentation: k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata

     1apiVersion: v1
     2items:
     3- apiVersion: rbac.authorization.k8s.io/v1
     4  kind: ClusterRoleBinding
     5  metadata:
     6    annotations:
     7      rbac.authorization.kubernetes.io/autoupdate: "true"
     8    creationTimestamp: null
     9    labels:
    10      kubernetes.io/bootstrapping: rbac-defaults
    11    name: cluster-admin
    12  roleRef:
    13    apiGroup: rbac.authorization.k8s.io
    14    kind: ClusterRole
    15    name: cluster-admin
    16  subjects:
    17  - apiGroup: rbac.authorization.k8s.io
    18    kind: Group
    19    name: system:masters
    20- apiVersion: rbac.authorization.k8s.io/v1
    21  kind: ClusterRoleBinding
    22  metadata:
    23    annotations:
    24      rbac.authorization.kubernetes.io/autoupdate: "true"
    25    creationTimestamp: null
    26    labels:
    27      kubernetes.io/bootstrapping: rbac-defaults
    28    name: system:basic-user
    29  roleRef:
    30    apiGroup: rbac.authorization.k8s.io
    31    kind: ClusterRole
    32    name: system:basic-user
    33  subjects:
    34  - apiGroup: rbac.authorization.k8s.io
    35    kind: Group
    36    name: system:authenticated
    37- apiVersion: rbac.authorization.k8s.io/v1
    38  kind: ClusterRoleBinding
    39  metadata:
    40    annotations:
    41      rbac.authorization.kubernetes.io/autoupdate: "true"
    42    creationTimestamp: null
    43    labels:
    44      kubernetes.io/bootstrapping: rbac-defaults
    45    name: system:discovery
    46  roleRef:
    47    apiGroup: rbac.authorization.k8s.io
    48    kind: ClusterRole
    49    name: system:discovery
    50  subjects:
    51  - apiGroup: rbac.authorization.k8s.io
    52    kind: Group
    53    name: system:authenticated
    54- apiVersion: rbac.authorization.k8s.io/v1
    55  kind: ClusterRoleBinding
    56  metadata:
    57    annotations:
    58      rbac.authorization.kubernetes.io/autoupdate: "true"
    59    creationTimestamp: null
    60    labels:
    61      kubernetes.io/bootstrapping: rbac-defaults
    62    name: system:kube-controller-manager
    63  roleRef:
    64    apiGroup: rbac.authorization.k8s.io
    65    kind: ClusterRole
    66    name: system:kube-controller-manager
    67  subjects:
    68  - apiGroup: rbac.authorization.k8s.io
    69    kind: User
    70    name: system:kube-controller-manager
    71- apiVersion: rbac.authorization.k8s.io/v1
    72  kind: ClusterRoleBinding
    73  metadata:
    74    annotations:
    75      rbac.authorization.kubernetes.io/autoupdate: "true"
    76    creationTimestamp: null
    77    labels:
    78      kubernetes.io/bootstrapping: rbac-defaults
    79    name: system:kube-dns
    80  roleRef:
    81    apiGroup: rbac.authorization.k8s.io
    82    kind: ClusterRole
    83    name: system:kube-dns
    84  subjects:
    85  - kind: ServiceAccount
    86    name: kube-dns
    87    namespace: kube-system
    88- apiVersion: rbac.authorization.k8s.io/v1
    89  kind: ClusterRoleBinding
    90  metadata:
    91    annotations:
    92      rbac.authorization.kubernetes.io/autoupdate: "true"
    93    creationTimestamp: null
    94    labels:
    95      kubernetes.io/bootstrapping: rbac-defaults
    96    name: system:kube-scheduler
    97  roleRef:
    98    apiGroup: rbac.authorization.k8s.io
    99    kind: ClusterRole
   100    name: system:kube-scheduler
   101  subjects:
   102  - apiGroup: rbac.authorization.k8s.io
   103    kind: User
   104    name: system:kube-scheduler
   105- apiVersion: rbac.authorization.k8s.io/v1
   106  kind: ClusterRoleBinding
   107  metadata:
   108    annotations:
   109      rbac.authorization.kubernetes.io/autoupdate: "true"
   110    creationTimestamp: null
   111    labels:
   112      kubernetes.io/bootstrapping: rbac-defaults
   113    name: system:monitoring
   114  roleRef:
   115    apiGroup: rbac.authorization.k8s.io
   116    kind: ClusterRole
   117    name: system:monitoring
   118  subjects:
   119  - apiGroup: rbac.authorization.k8s.io
   120    kind: Group
   121    name: system:monitoring
   122- apiVersion: rbac.authorization.k8s.io/v1
   123  kind: ClusterRoleBinding
   124  metadata:
   125    annotations:
   126      rbac.authorization.kubernetes.io/autoupdate: "true"
   127    creationTimestamp: null
   128    labels:
   129      kubernetes.io/bootstrapping: rbac-defaults
   130    name: system:node
   131  roleRef:
   132    apiGroup: rbac.authorization.k8s.io
   133    kind: ClusterRole
   134    name: system:node
   135- apiVersion: rbac.authorization.k8s.io/v1
   136  kind: ClusterRoleBinding
   137  metadata:
   138    annotations:
   139      rbac.authorization.kubernetes.io/autoupdate: "true"
   140    creationTimestamp: null
   141    labels:
   142      kubernetes.io/bootstrapping: rbac-defaults
   143    name: system:node-proxier
   144  roleRef:
   145    apiGroup: rbac.authorization.k8s.io
   146    kind: ClusterRole
   147    name: system:node-proxier
   148  subjects:
   149  - apiGroup: rbac.authorization.k8s.io
   150    kind: User
   151    name: system:kube-proxy
   152- apiVersion: rbac.authorization.k8s.io/v1
   153  kind: ClusterRoleBinding
   154  metadata:
   155    annotations:
   156      rbac.authorization.kubernetes.io/autoupdate: "true"
   157    creationTimestamp: null
   158    labels:
   159      kubernetes.io/bootstrapping: rbac-defaults
   160    name: system:public-info-viewer
   161  roleRef:
   162    apiGroup: rbac.authorization.k8s.io
   163    kind: ClusterRole
   164    name: system:public-info-viewer
   165  subjects:
   166  - apiGroup: rbac.authorization.k8s.io
   167    kind: Group
   168    name: system:authenticated
   169  - apiGroup: rbac.authorization.k8s.io
   170    kind: Group
   171    name: system:unauthenticated
   172- apiVersion: rbac.authorization.k8s.io/v1
   173  kind: ClusterRoleBinding
   174  metadata:
   175    annotations:
   176      rbac.authorization.kubernetes.io/autoupdate: "true"
   177    creationTimestamp: null
   178    labels:
   179      kubernetes.io/bootstrapping: rbac-defaults
   180    name: system:service-account-issuer-discovery
   181  roleRef:
   182    apiGroup: rbac.authorization.k8s.io
   183    kind: ClusterRole
   184    name: system:service-account-issuer-discovery
   185  subjects:
   186  - apiGroup: rbac.authorization.k8s.io
   187    kind: Group
   188    name: system:serviceaccounts
   189- apiVersion: rbac.authorization.k8s.io/v1
   190  kind: ClusterRoleBinding
   191  metadata:
   192    annotations:
   193      rbac.authorization.kubernetes.io/autoupdate: "true"
   194    creationTimestamp: null
   195    labels:
   196      kubernetes.io/bootstrapping: rbac-defaults
   197    name: system:volume-scheduler
   198  roleRef:
   199    apiGroup: rbac.authorization.k8s.io
   200    kind: ClusterRole
   201    name: system:volume-scheduler
   202  subjects:
   203  - apiGroup: rbac.authorization.k8s.io
   204    kind: User
   205    name: system:kube-scheduler
   206kind: List
   207metadata: {}

View as plain text