k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml (about) 1 apiVersion: v1 2 items: 3 - apiVersion: rbac.authorization.k8s.io/v1 4 kind: ClusterRoleBinding 5 metadata: 6 annotations: 7 rbac.authorization.kubernetes.io/autoupdate: "true" 8 creationTimestamp: null 9 labels: 10 kubernetes.io/bootstrapping: rbac-defaults 11 name: cluster-admin 12 roleRef: 13 apiGroup: rbac.authorization.k8s.io 14 kind: ClusterRole 15 name: cluster-admin 16 subjects: 17 - apiGroup: rbac.authorization.k8s.io 18 kind: Group 19 name: system:masters 20 - apiVersion: rbac.authorization.k8s.io/v1 21 kind: ClusterRoleBinding 22 metadata: 23 annotations: 24 rbac.authorization.kubernetes.io/autoupdate: "true" 25 creationTimestamp: null 26 labels: 27 kubernetes.io/bootstrapping: rbac-defaults 28 name: system:basic-user 29 roleRef: 30 apiGroup: rbac.authorization.k8s.io 31 kind: ClusterRole 32 name: system:basic-user 33 subjects: 34 - apiGroup: rbac.authorization.k8s.io 35 kind: Group 36 name: system:authenticated 37 - apiVersion: rbac.authorization.k8s.io/v1 38 kind: ClusterRoleBinding 39 metadata: 40 annotations: 41 rbac.authorization.kubernetes.io/autoupdate: "true" 42 creationTimestamp: null 43 labels: 44 kubernetes.io/bootstrapping: rbac-defaults 45 name: system:discovery 46 roleRef: 47 apiGroup: rbac.authorization.k8s.io 48 kind: ClusterRole 49 name: system:discovery 50 subjects: 51 - apiGroup: rbac.authorization.k8s.io 52 kind: Group 53 name: system:authenticated 54 - apiVersion: rbac.authorization.k8s.io/v1 55 kind: ClusterRoleBinding 56 metadata: 57 annotations: 58 rbac.authorization.kubernetes.io/autoupdate: "true" 59 creationTimestamp: null 60 labels: 61 kubernetes.io/bootstrapping: rbac-defaults 62 name: system:kube-controller-manager 63 roleRef: 64 apiGroup: rbac.authorization.k8s.io 65 kind: ClusterRole 66 name: system:kube-controller-manager 67 subjects: 68 - apiGroup: rbac.authorization.k8s.io 69 kind: User 70 name: system:kube-controller-manager 71 - apiVersion: rbac.authorization.k8s.io/v1 72 kind: ClusterRoleBinding 73 metadata: 74 annotations: 75 rbac.authorization.kubernetes.io/autoupdate: "true" 76 creationTimestamp: null 77 labels: 78 kubernetes.io/bootstrapping: rbac-defaults 79 name: system:kube-dns 80 roleRef: 81 apiGroup: rbac.authorization.k8s.io 82 kind: ClusterRole 83 name: system:kube-dns 84 subjects: 85 - kind: ServiceAccount 86 name: kube-dns 87 namespace: kube-system 88 - apiVersion: rbac.authorization.k8s.io/v1 89 kind: ClusterRoleBinding 90 metadata: 91 annotations: 92 rbac.authorization.kubernetes.io/autoupdate: "true" 93 creationTimestamp: null 94 labels: 95 kubernetes.io/bootstrapping: rbac-defaults 96 name: system:kube-scheduler 97 roleRef: 98 apiGroup: rbac.authorization.k8s.io 99 kind: ClusterRole 100 name: system:kube-scheduler 101 subjects: 102 - apiGroup: rbac.authorization.k8s.io 103 kind: User 104 name: system:kube-scheduler 105 - apiVersion: rbac.authorization.k8s.io/v1 106 kind: ClusterRoleBinding 107 metadata: 108 annotations: 109 rbac.authorization.kubernetes.io/autoupdate: "true" 110 creationTimestamp: null 111 labels: 112 kubernetes.io/bootstrapping: rbac-defaults 113 name: system:monitoring 114 roleRef: 115 apiGroup: rbac.authorization.k8s.io 116 kind: ClusterRole 117 name: system:monitoring 118 subjects: 119 - apiGroup: rbac.authorization.k8s.io 120 kind: Group 121 name: system:monitoring 122 - apiVersion: rbac.authorization.k8s.io/v1 123 kind: ClusterRoleBinding 124 metadata: 125 annotations: 126 rbac.authorization.kubernetes.io/autoupdate: "true" 127 creationTimestamp: null 128 labels: 129 kubernetes.io/bootstrapping: rbac-defaults 130 name: system:node 131 roleRef: 132 apiGroup: rbac.authorization.k8s.io 133 kind: ClusterRole 134 name: system:node 135 - apiVersion: rbac.authorization.k8s.io/v1 136 kind: ClusterRoleBinding 137 metadata: 138 annotations: 139 rbac.authorization.kubernetes.io/autoupdate: "true" 140 creationTimestamp: null 141 labels: 142 kubernetes.io/bootstrapping: rbac-defaults 143 name: system:node-proxier 144 roleRef: 145 apiGroup: rbac.authorization.k8s.io 146 kind: ClusterRole 147 name: system:node-proxier 148 subjects: 149 - apiGroup: rbac.authorization.k8s.io 150 kind: User 151 name: system:kube-proxy 152 - apiVersion: rbac.authorization.k8s.io/v1 153 kind: ClusterRoleBinding 154 metadata: 155 annotations: 156 rbac.authorization.kubernetes.io/autoupdate: "true" 157 creationTimestamp: null 158 labels: 159 kubernetes.io/bootstrapping: rbac-defaults 160 name: system:public-info-viewer 161 roleRef: 162 apiGroup: rbac.authorization.k8s.io 163 kind: ClusterRole 164 name: system:public-info-viewer 165 subjects: 166 - apiGroup: rbac.authorization.k8s.io 167 kind: Group 168 name: system:authenticated 169 - apiGroup: rbac.authorization.k8s.io 170 kind: Group 171 name: system:unauthenticated 172 - apiVersion: rbac.authorization.k8s.io/v1 173 kind: ClusterRoleBinding 174 metadata: 175 annotations: 176 rbac.authorization.kubernetes.io/autoupdate: "true" 177 creationTimestamp: null 178 labels: 179 kubernetes.io/bootstrapping: rbac-defaults 180 name: system:service-account-issuer-discovery 181 roleRef: 182 apiGroup: rbac.authorization.k8s.io 183 kind: ClusterRole 184 name: system:service-account-issuer-discovery 185 subjects: 186 - apiGroup: rbac.authorization.k8s.io 187 kind: Group 188 name: system:serviceaccounts 189 - apiVersion: rbac.authorization.k8s.io/v1 190 kind: ClusterRoleBinding 191 metadata: 192 annotations: 193 rbac.authorization.kubernetes.io/autoupdate: "true" 194 creationTimestamp: null 195 labels: 196 kubernetes.io/bootstrapping: rbac-defaults 197 name: system:volume-scheduler 198 roleRef: 199 apiGroup: rbac.authorization.k8s.io 200 kind: ClusterRole 201 name: system:volume-scheduler 202 subjects: 203 - apiGroup: rbac.authorization.k8s.io 204 kind: User 205 name: system:kube-scheduler 206 kind: List 207 metadata: {}