...

Text file src/k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml

Documentation: k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata

     1apiVersion: v1
     2items:
     3- apiVersion: rbac.authorization.k8s.io/v1
     4  kind: ClusterRoleBinding
     5  metadata:
     6    annotations:
     7      rbac.authorization.kubernetes.io/autoupdate: "true"
     8    creationTimestamp: null
     9    labels:
    10      kubernetes.io/bootstrapping: rbac-defaults
    11    name: system:controller:attachdetach-controller
    12  roleRef:
    13    apiGroup: rbac.authorization.k8s.io
    14    kind: ClusterRole
    15    name: system:controller:attachdetach-controller
    16  subjects:
    17  - kind: ServiceAccount
    18    name: attachdetach-controller
    19    namespace: kube-system
    20- apiVersion: rbac.authorization.k8s.io/v1
    21  kind: ClusterRoleBinding
    22  metadata:
    23    annotations:
    24      rbac.authorization.kubernetes.io/autoupdate: "true"
    25    creationTimestamp: null
    26    labels:
    27      kubernetes.io/bootstrapping: rbac-defaults
    28    name: system:controller:certificate-controller
    29  roleRef:
    30    apiGroup: rbac.authorization.k8s.io
    31    kind: ClusterRole
    32    name: system:controller:certificate-controller
    33  subjects:
    34  - kind: ServiceAccount
    35    name: certificate-controller
    36    namespace: kube-system
    37- apiVersion: rbac.authorization.k8s.io/v1
    38  kind: ClusterRoleBinding
    39  metadata:
    40    annotations:
    41      rbac.authorization.kubernetes.io/autoupdate: "true"
    42    creationTimestamp: null
    43    labels:
    44      kubernetes.io/bootstrapping: rbac-defaults
    45    name: system:controller:clusterrole-aggregation-controller
    46  roleRef:
    47    apiGroup: rbac.authorization.k8s.io
    48    kind: ClusterRole
    49    name: system:controller:clusterrole-aggregation-controller
    50  subjects:
    51  - kind: ServiceAccount
    52    name: clusterrole-aggregation-controller
    53    namespace: kube-system
    54- apiVersion: rbac.authorization.k8s.io/v1
    55  kind: ClusterRoleBinding
    56  metadata:
    57    annotations:
    58      rbac.authorization.kubernetes.io/autoupdate: "true"
    59    creationTimestamp: null
    60    labels:
    61      kubernetes.io/bootstrapping: rbac-defaults
    62    name: system:controller:cronjob-controller
    63  roleRef:
    64    apiGroup: rbac.authorization.k8s.io
    65    kind: ClusterRole
    66    name: system:controller:cronjob-controller
    67  subjects:
    68  - kind: ServiceAccount
    69    name: cronjob-controller
    70    namespace: kube-system
    71- apiVersion: rbac.authorization.k8s.io/v1
    72  kind: ClusterRoleBinding
    73  metadata:
    74    annotations:
    75      rbac.authorization.kubernetes.io/autoupdate: "true"
    76    creationTimestamp: null
    77    labels:
    78      kubernetes.io/bootstrapping: rbac-defaults
    79    name: system:controller:daemon-set-controller
    80  roleRef:
    81    apiGroup: rbac.authorization.k8s.io
    82    kind: ClusterRole
    83    name: system:controller:daemon-set-controller
    84  subjects:
    85  - kind: ServiceAccount
    86    name: daemon-set-controller
    87    namespace: kube-system
    88- apiVersion: rbac.authorization.k8s.io/v1
    89  kind: ClusterRoleBinding
    90  metadata:
    91    annotations:
    92      rbac.authorization.kubernetes.io/autoupdate: "true"
    93    creationTimestamp: null
    94    labels:
    95      kubernetes.io/bootstrapping: rbac-defaults
    96    name: system:controller:deployment-controller
    97  roleRef:
    98    apiGroup: rbac.authorization.k8s.io
    99    kind: ClusterRole
   100    name: system:controller:deployment-controller
   101  subjects:
   102  - kind: ServiceAccount
   103    name: deployment-controller
   104    namespace: kube-system
   105- apiVersion: rbac.authorization.k8s.io/v1
   106  kind: ClusterRoleBinding
   107  metadata:
   108    annotations:
   109      rbac.authorization.kubernetes.io/autoupdate: "true"
   110    creationTimestamp: null
   111    labels:
   112      kubernetes.io/bootstrapping: rbac-defaults
   113    name: system:controller:disruption-controller
   114  roleRef:
   115    apiGroup: rbac.authorization.k8s.io
   116    kind: ClusterRole
   117    name: system:controller:disruption-controller
   118  subjects:
   119  - kind: ServiceAccount
   120    name: disruption-controller
   121    namespace: kube-system
   122- apiVersion: rbac.authorization.k8s.io/v1
   123  kind: ClusterRoleBinding
   124  metadata:
   125    annotations:
   126      rbac.authorization.kubernetes.io/autoupdate: "true"
   127    creationTimestamp: null
   128    labels:
   129      kubernetes.io/bootstrapping: rbac-defaults
   130    name: system:controller:endpoint-controller
   131  roleRef:
   132    apiGroup: rbac.authorization.k8s.io
   133    kind: ClusterRole
   134    name: system:controller:endpoint-controller
   135  subjects:
   136  - kind: ServiceAccount
   137    name: endpoint-controller
   138    namespace: kube-system
   139- apiVersion: rbac.authorization.k8s.io/v1
   140  kind: ClusterRoleBinding
   141  metadata:
   142    annotations:
   143      rbac.authorization.kubernetes.io/autoupdate: "true"
   144    creationTimestamp: null
   145    labels:
   146      kubernetes.io/bootstrapping: rbac-defaults
   147    name: system:controller:endpointslice-controller
   148  roleRef:
   149    apiGroup: rbac.authorization.k8s.io
   150    kind: ClusterRole
   151    name: system:controller:endpointslice-controller
   152  subjects:
   153  - kind: ServiceAccount
   154    name: endpointslice-controller
   155    namespace: kube-system
   156- apiVersion: rbac.authorization.k8s.io/v1
   157  kind: ClusterRoleBinding
   158  metadata:
   159    annotations:
   160      rbac.authorization.kubernetes.io/autoupdate: "true"
   161    creationTimestamp: null
   162    labels:
   163      kubernetes.io/bootstrapping: rbac-defaults
   164    name: system:controller:endpointslicemirroring-controller
   165  roleRef:
   166    apiGroup: rbac.authorization.k8s.io
   167    kind: ClusterRole
   168    name: system:controller:endpointslicemirroring-controller
   169  subjects:
   170  - kind: ServiceAccount
   171    name: endpointslicemirroring-controller
   172    namespace: kube-system
   173- apiVersion: rbac.authorization.k8s.io/v1
   174  kind: ClusterRoleBinding
   175  metadata:
   176    annotations:
   177      rbac.authorization.kubernetes.io/autoupdate: "true"
   178    creationTimestamp: null
   179    labels:
   180      kubernetes.io/bootstrapping: rbac-defaults
   181    name: system:controller:ephemeral-volume-controller
   182  roleRef:
   183    apiGroup: rbac.authorization.k8s.io
   184    kind: ClusterRole
   185    name: system:controller:ephemeral-volume-controller
   186  subjects:
   187  - kind: ServiceAccount
   188    name: ephemeral-volume-controller
   189    namespace: kube-system
   190- apiVersion: rbac.authorization.k8s.io/v1
   191  kind: ClusterRoleBinding
   192  metadata:
   193    annotations:
   194      rbac.authorization.kubernetes.io/autoupdate: "true"
   195    creationTimestamp: null
   196    labels:
   197      kubernetes.io/bootstrapping: rbac-defaults
   198    name: system:controller:expand-controller
   199  roleRef:
   200    apiGroup: rbac.authorization.k8s.io
   201    kind: ClusterRole
   202    name: system:controller:expand-controller
   203  subjects:
   204  - kind: ServiceAccount
   205    name: expand-controller
   206    namespace: kube-system
   207- apiVersion: rbac.authorization.k8s.io/v1
   208  kind: ClusterRoleBinding
   209  metadata:
   210    annotations:
   211      rbac.authorization.kubernetes.io/autoupdate: "true"
   212    creationTimestamp: null
   213    labels:
   214      kubernetes.io/bootstrapping: rbac-defaults
   215    name: system:controller:generic-garbage-collector
   216  roleRef:
   217    apiGroup: rbac.authorization.k8s.io
   218    kind: ClusterRole
   219    name: system:controller:generic-garbage-collector
   220  subjects:
   221  - kind: ServiceAccount
   222    name: generic-garbage-collector
   223    namespace: kube-system
   224- apiVersion: rbac.authorization.k8s.io/v1
   225  kind: ClusterRoleBinding
   226  metadata:
   227    annotations:
   228      rbac.authorization.kubernetes.io/autoupdate: "true"
   229    creationTimestamp: null
   230    labels:
   231      kubernetes.io/bootstrapping: rbac-defaults
   232    name: system:controller:horizontal-pod-autoscaler
   233  roleRef:
   234    apiGroup: rbac.authorization.k8s.io
   235    kind: ClusterRole
   236    name: system:controller:horizontal-pod-autoscaler
   237  subjects:
   238  - kind: ServiceAccount
   239    name: horizontal-pod-autoscaler
   240    namespace: kube-system
   241- apiVersion: rbac.authorization.k8s.io/v1
   242  kind: ClusterRoleBinding
   243  metadata:
   244    annotations:
   245      rbac.authorization.kubernetes.io/autoupdate: "true"
   246    creationTimestamp: null
   247    labels:
   248      kubernetes.io/bootstrapping: rbac-defaults
   249    name: system:controller:job-controller
   250  roleRef:
   251    apiGroup: rbac.authorization.k8s.io
   252    kind: ClusterRole
   253    name: system:controller:job-controller
   254  subjects:
   255  - kind: ServiceAccount
   256    name: job-controller
   257    namespace: kube-system
   258- apiVersion: rbac.authorization.k8s.io/v1
   259  kind: ClusterRoleBinding
   260  metadata:
   261    annotations:
   262      rbac.authorization.kubernetes.io/autoupdate: "true"
   263    creationTimestamp: null
   264    labels:
   265      kubernetes.io/bootstrapping: rbac-defaults
   266    name: system:controller:legacy-service-account-token-cleaner
   267  roleRef:
   268    apiGroup: rbac.authorization.k8s.io
   269    kind: ClusterRole
   270    name: system:controller:legacy-service-account-token-cleaner
   271  subjects:
   272  - kind: ServiceAccount
   273    name: legacy-service-account-token-cleaner
   274    namespace: kube-system
   275- apiVersion: rbac.authorization.k8s.io/v1
   276  kind: ClusterRoleBinding
   277  metadata:
   278    annotations:
   279      rbac.authorization.kubernetes.io/autoupdate: "true"
   280    creationTimestamp: null
   281    labels:
   282      kubernetes.io/bootstrapping: rbac-defaults
   283    name: system:controller:namespace-controller
   284  roleRef:
   285    apiGroup: rbac.authorization.k8s.io
   286    kind: ClusterRole
   287    name: system:controller:namespace-controller
   288  subjects:
   289  - kind: ServiceAccount
   290    name: namespace-controller
   291    namespace: kube-system
   292- apiVersion: rbac.authorization.k8s.io/v1
   293  kind: ClusterRoleBinding
   294  metadata:
   295    annotations:
   296      rbac.authorization.kubernetes.io/autoupdate: "true"
   297    creationTimestamp: null
   298    labels:
   299      kubernetes.io/bootstrapping: rbac-defaults
   300    name: system:controller:node-controller
   301  roleRef:
   302    apiGroup: rbac.authorization.k8s.io
   303    kind: ClusterRole
   304    name: system:controller:node-controller
   305  subjects:
   306  - kind: ServiceAccount
   307    name: node-controller
   308    namespace: kube-system
   309- apiVersion: rbac.authorization.k8s.io/v1
   310  kind: ClusterRoleBinding
   311  metadata:
   312    annotations:
   313      rbac.authorization.kubernetes.io/autoupdate: "true"
   314    creationTimestamp: null
   315    labels:
   316      kubernetes.io/bootstrapping: rbac-defaults
   317    name: system:controller:persistent-volume-binder
   318  roleRef:
   319    apiGroup: rbac.authorization.k8s.io
   320    kind: ClusterRole
   321    name: system:controller:persistent-volume-binder
   322  subjects:
   323  - kind: ServiceAccount
   324    name: persistent-volume-binder
   325    namespace: kube-system
   326- apiVersion: rbac.authorization.k8s.io/v1
   327  kind: ClusterRoleBinding
   328  metadata:
   329    annotations:
   330      rbac.authorization.kubernetes.io/autoupdate: "true"
   331    creationTimestamp: null
   332    labels:
   333      kubernetes.io/bootstrapping: rbac-defaults
   334    name: system:controller:pod-garbage-collector
   335  roleRef:
   336    apiGroup: rbac.authorization.k8s.io
   337    kind: ClusterRole
   338    name: system:controller:pod-garbage-collector
   339  subjects:
   340  - kind: ServiceAccount
   341    name: pod-garbage-collector
   342    namespace: kube-system
   343- apiVersion: rbac.authorization.k8s.io/v1
   344  kind: ClusterRoleBinding
   345  metadata:
   346    annotations:
   347      rbac.authorization.kubernetes.io/autoupdate: "true"
   348    creationTimestamp: null
   349    labels:
   350      kubernetes.io/bootstrapping: rbac-defaults
   351    name: system:controller:pv-protection-controller
   352  roleRef:
   353    apiGroup: rbac.authorization.k8s.io
   354    kind: ClusterRole
   355    name: system:controller:pv-protection-controller
   356  subjects:
   357  - kind: ServiceAccount
   358    name: pv-protection-controller
   359    namespace: kube-system
   360- apiVersion: rbac.authorization.k8s.io/v1
   361  kind: ClusterRoleBinding
   362  metadata:
   363    annotations:
   364      rbac.authorization.kubernetes.io/autoupdate: "true"
   365    creationTimestamp: null
   366    labels:
   367      kubernetes.io/bootstrapping: rbac-defaults
   368    name: system:controller:pvc-protection-controller
   369  roleRef:
   370    apiGroup: rbac.authorization.k8s.io
   371    kind: ClusterRole
   372    name: system:controller:pvc-protection-controller
   373  subjects:
   374  - kind: ServiceAccount
   375    name: pvc-protection-controller
   376    namespace: kube-system
   377- apiVersion: rbac.authorization.k8s.io/v1
   378  kind: ClusterRoleBinding
   379  metadata:
   380    annotations:
   381      rbac.authorization.kubernetes.io/autoupdate: "true"
   382    creationTimestamp: null
   383    labels:
   384      kubernetes.io/bootstrapping: rbac-defaults
   385    name: system:controller:replicaset-controller
   386  roleRef:
   387    apiGroup: rbac.authorization.k8s.io
   388    kind: ClusterRole
   389    name: system:controller:replicaset-controller
   390  subjects:
   391  - kind: ServiceAccount
   392    name: replicaset-controller
   393    namespace: kube-system
   394- apiVersion: rbac.authorization.k8s.io/v1
   395  kind: ClusterRoleBinding
   396  metadata:
   397    annotations:
   398      rbac.authorization.kubernetes.io/autoupdate: "true"
   399    creationTimestamp: null
   400    labels:
   401      kubernetes.io/bootstrapping: rbac-defaults
   402    name: system:controller:replication-controller
   403  roleRef:
   404    apiGroup: rbac.authorization.k8s.io
   405    kind: ClusterRole
   406    name: system:controller:replication-controller
   407  subjects:
   408  - kind: ServiceAccount
   409    name: replication-controller
   410    namespace: kube-system
   411- apiVersion: rbac.authorization.k8s.io/v1
   412  kind: ClusterRoleBinding
   413  metadata:
   414    annotations:
   415      rbac.authorization.kubernetes.io/autoupdate: "true"
   416    creationTimestamp: null
   417    labels:
   418      kubernetes.io/bootstrapping: rbac-defaults
   419    name: system:controller:resourcequota-controller
   420  roleRef:
   421    apiGroup: rbac.authorization.k8s.io
   422    kind: ClusterRole
   423    name: system:controller:resourcequota-controller
   424  subjects:
   425  - kind: ServiceAccount
   426    name: resourcequota-controller
   427    namespace: kube-system
   428- apiVersion: rbac.authorization.k8s.io/v1
   429  kind: ClusterRoleBinding
   430  metadata:
   431    annotations:
   432      rbac.authorization.kubernetes.io/autoupdate: "true"
   433    creationTimestamp: null
   434    labels:
   435      kubernetes.io/bootstrapping: rbac-defaults
   436    name: system:controller:root-ca-cert-publisher
   437  roleRef:
   438    apiGroup: rbac.authorization.k8s.io
   439    kind: ClusterRole
   440    name: system:controller:root-ca-cert-publisher
   441  subjects:
   442  - kind: ServiceAccount
   443    name: root-ca-cert-publisher
   444    namespace: kube-system
   445- apiVersion: rbac.authorization.k8s.io/v1
   446  kind: ClusterRoleBinding
   447  metadata:
   448    annotations:
   449      rbac.authorization.kubernetes.io/autoupdate: "true"
   450    creationTimestamp: null
   451    labels:
   452      kubernetes.io/bootstrapping: rbac-defaults
   453    name: system:controller:route-controller
   454  roleRef:
   455    apiGroup: rbac.authorization.k8s.io
   456    kind: ClusterRole
   457    name: system:controller:route-controller
   458  subjects:
   459  - kind: ServiceAccount
   460    name: route-controller
   461    namespace: kube-system
   462- apiVersion: rbac.authorization.k8s.io/v1
   463  kind: ClusterRoleBinding
   464  metadata:
   465    annotations:
   466      rbac.authorization.kubernetes.io/autoupdate: "true"
   467    creationTimestamp: null
   468    labels:
   469      kubernetes.io/bootstrapping: rbac-defaults
   470    name: system:controller:service-account-controller
   471  roleRef:
   472    apiGroup: rbac.authorization.k8s.io
   473    kind: ClusterRole
   474    name: system:controller:service-account-controller
   475  subjects:
   476  - kind: ServiceAccount
   477    name: service-account-controller
   478    namespace: kube-system
   479- apiVersion: rbac.authorization.k8s.io/v1
   480  kind: ClusterRoleBinding
   481  metadata:
   482    annotations:
   483      rbac.authorization.kubernetes.io/autoupdate: "true"
   484    creationTimestamp: null
   485    labels:
   486      kubernetes.io/bootstrapping: rbac-defaults
   487    name: system:controller:service-controller
   488  roleRef:
   489    apiGroup: rbac.authorization.k8s.io
   490    kind: ClusterRole
   491    name: system:controller:service-controller
   492  subjects:
   493  - kind: ServiceAccount
   494    name: service-controller
   495    namespace: kube-system
   496- apiVersion: rbac.authorization.k8s.io/v1
   497  kind: ClusterRoleBinding
   498  metadata:
   499    annotations:
   500      rbac.authorization.kubernetes.io/autoupdate: "true"
   501    creationTimestamp: null
   502    labels:
   503      kubernetes.io/bootstrapping: rbac-defaults
   504    name: system:controller:statefulset-controller
   505  roleRef:
   506    apiGroup: rbac.authorization.k8s.io
   507    kind: ClusterRole
   508    name: system:controller:statefulset-controller
   509  subjects:
   510  - kind: ServiceAccount
   511    name: statefulset-controller
   512    namespace: kube-system
   513- apiVersion: rbac.authorization.k8s.io/v1
   514  kind: ClusterRoleBinding
   515  metadata:
   516    annotations:
   517      rbac.authorization.kubernetes.io/autoupdate: "true"
   518    creationTimestamp: null
   519    labels:
   520      kubernetes.io/bootstrapping: rbac-defaults
   521    name: system:controller:ttl-after-finished-controller
   522  roleRef:
   523    apiGroup: rbac.authorization.k8s.io
   524    kind: ClusterRole
   525    name: system:controller:ttl-after-finished-controller
   526  subjects:
   527  - kind: ServiceAccount
   528    name: ttl-after-finished-controller
   529    namespace: kube-system
   530- apiVersion: rbac.authorization.k8s.io/v1
   531  kind: ClusterRoleBinding
   532  metadata:
   533    annotations:
   534      rbac.authorization.kubernetes.io/autoupdate: "true"
   535    creationTimestamp: null
   536    labels:
   537      kubernetes.io/bootstrapping: rbac-defaults
   538    name: system:controller:ttl-controller
   539  roleRef:
   540    apiGroup: rbac.authorization.k8s.io
   541    kind: ClusterRole
   542    name: system:controller:ttl-controller
   543  subjects:
   544  - kind: ServiceAccount
   545    name: ttl-controller
   546    namespace: kube-system
   547- apiVersion: rbac.authorization.k8s.io/v1
   548  kind: ClusterRoleBinding
   549  metadata:
   550    annotations:
   551      rbac.authorization.kubernetes.io/autoupdate: "true"
   552    creationTimestamp: null
   553    labels:
   554      kubernetes.io/bootstrapping: rbac-defaults
   555    name: system:controller:validatingadmissionpolicy-status-controller
   556  roleRef:
   557    apiGroup: rbac.authorization.k8s.io
   558    kind: ClusterRole
   559    name: system:controller:validatingadmissionpolicy-status-controller
   560  subjects:
   561  - kind: ServiceAccount
   562    name: validatingadmissionpolicy-status-controller
   563    namespace: kube-system
   564kind: List
   565metadata: {}

View as plain text