k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml (about)

     1  apiVersion: v1
     2  items:
     3  - apiVersion: rbac.authorization.k8s.io/v1
     4    kind: ClusterRoleBinding
     5    metadata:
     6      annotations:
     7        rbac.authorization.kubernetes.io/autoupdate: "true"
     8      creationTimestamp: null
     9      labels:
    10        kubernetes.io/bootstrapping: rbac-defaults
    11      name: cluster-admin
    12    roleRef:
    13      apiGroup: rbac.authorization.k8s.io
    14      kind: ClusterRole
    15      name: cluster-admin
    16    subjects:
    17    - apiGroup: rbac.authorization.k8s.io
    18      kind: Group
    19      name: system:masters
    20  - apiVersion: rbac.authorization.k8s.io/v1
    21    kind: ClusterRoleBinding
    22    metadata:
    23      annotations:
    24        rbac.authorization.kubernetes.io/autoupdate: "true"
    25      creationTimestamp: null
    26      labels:
    27        kubernetes.io/bootstrapping: rbac-defaults
    28      name: system:basic-user
    29    roleRef:
    30      apiGroup: rbac.authorization.k8s.io
    31      kind: ClusterRole
    32      name: system:basic-user
    33    subjects:
    34    - apiGroup: rbac.authorization.k8s.io
    35      kind: Group
    36      name: system:authenticated
    37  - apiVersion: rbac.authorization.k8s.io/v1
    38    kind: ClusterRoleBinding
    39    metadata:
    40      annotations:
    41        rbac.authorization.kubernetes.io/autoupdate: "true"
    42      creationTimestamp: null
    43      labels:
    44        kubernetes.io/bootstrapping: rbac-defaults
    45      name: system:discovery
    46    roleRef:
    47      apiGroup: rbac.authorization.k8s.io
    48      kind: ClusterRole
    49      name: system:discovery
    50    subjects:
    51    - apiGroup: rbac.authorization.k8s.io
    52      kind: Group
    53      name: system:authenticated
    54  - apiVersion: rbac.authorization.k8s.io/v1
    55    kind: ClusterRoleBinding
    56    metadata:
    57      annotations:
    58        rbac.authorization.kubernetes.io/autoupdate: "true"
    59      creationTimestamp: null
    60      labels:
    61        kubernetes.io/bootstrapping: rbac-defaults
    62      name: system:kube-controller-manager
    63    roleRef:
    64      apiGroup: rbac.authorization.k8s.io
    65      kind: ClusterRole
    66      name: system:kube-controller-manager
    67    subjects:
    68    - apiGroup: rbac.authorization.k8s.io
    69      kind: User
    70      name: system:kube-controller-manager
    71  - apiVersion: rbac.authorization.k8s.io/v1
    72    kind: ClusterRoleBinding
    73    metadata:
    74      annotations:
    75        rbac.authorization.kubernetes.io/autoupdate: "true"
    76      creationTimestamp: null
    77      labels:
    78        kubernetes.io/bootstrapping: rbac-defaults
    79      name: system:kube-dns
    80    roleRef:
    81      apiGroup: rbac.authorization.k8s.io
    82      kind: ClusterRole
    83      name: system:kube-dns
    84    subjects:
    85    - kind: ServiceAccount
    86      name: kube-dns
    87      namespace: kube-system
    88  - apiVersion: rbac.authorization.k8s.io/v1
    89    kind: ClusterRoleBinding
    90    metadata:
    91      annotations:
    92        rbac.authorization.kubernetes.io/autoupdate: "true"
    93      creationTimestamp: null
    94      labels:
    95        kubernetes.io/bootstrapping: rbac-defaults
    96      name: system:kube-scheduler
    97    roleRef:
    98      apiGroup: rbac.authorization.k8s.io
    99      kind: ClusterRole
   100      name: system:kube-scheduler
   101    subjects:
   102    - apiGroup: rbac.authorization.k8s.io
   103      kind: User
   104      name: system:kube-scheduler
   105  - apiVersion: rbac.authorization.k8s.io/v1
   106    kind: ClusterRoleBinding
   107    metadata:
   108      annotations:
   109        rbac.authorization.kubernetes.io/autoupdate: "true"
   110      creationTimestamp: null
   111      labels:
   112        kubernetes.io/bootstrapping: rbac-defaults
   113      name: system:monitoring
   114    roleRef:
   115      apiGroup: rbac.authorization.k8s.io
   116      kind: ClusterRole
   117      name: system:monitoring
   118    subjects:
   119    - apiGroup: rbac.authorization.k8s.io
   120      kind: Group
   121      name: system:monitoring
   122  - apiVersion: rbac.authorization.k8s.io/v1
   123    kind: ClusterRoleBinding
   124    metadata:
   125      annotations:
   126        rbac.authorization.kubernetes.io/autoupdate: "true"
   127      creationTimestamp: null
   128      labels:
   129        kubernetes.io/bootstrapping: rbac-defaults
   130      name: system:node
   131    roleRef:
   132      apiGroup: rbac.authorization.k8s.io
   133      kind: ClusterRole
   134      name: system:node
   135  - apiVersion: rbac.authorization.k8s.io/v1
   136    kind: ClusterRoleBinding
   137    metadata:
   138      annotations:
   139        rbac.authorization.kubernetes.io/autoupdate: "true"
   140      creationTimestamp: null
   141      labels:
   142        kubernetes.io/bootstrapping: rbac-defaults
   143      name: system:node-proxier
   144    roleRef:
   145      apiGroup: rbac.authorization.k8s.io
   146      kind: ClusterRole
   147      name: system:node-proxier
   148    subjects:
   149    - apiGroup: rbac.authorization.k8s.io
   150      kind: User
   151      name: system:kube-proxy
   152  - apiVersion: rbac.authorization.k8s.io/v1
   153    kind: ClusterRoleBinding
   154    metadata:
   155      annotations:
   156        rbac.authorization.kubernetes.io/autoupdate: "true"
   157      creationTimestamp: null
   158      labels:
   159        kubernetes.io/bootstrapping: rbac-defaults
   160      name: system:public-info-viewer
   161    roleRef:
   162      apiGroup: rbac.authorization.k8s.io
   163      kind: ClusterRole
   164      name: system:public-info-viewer
   165    subjects:
   166    - apiGroup: rbac.authorization.k8s.io
   167      kind: Group
   168      name: system:authenticated
   169    - apiGroup: rbac.authorization.k8s.io
   170      kind: Group
   171      name: system:unauthenticated
   172  - apiVersion: rbac.authorization.k8s.io/v1
   173    kind: ClusterRoleBinding
   174    metadata:
   175      annotations:
   176        rbac.authorization.kubernetes.io/autoupdate: "true"
   177      creationTimestamp: null
   178      labels:
   179        kubernetes.io/bootstrapping: rbac-defaults
   180      name: system:service-account-issuer-discovery
   181    roleRef:
   182      apiGroup: rbac.authorization.k8s.io
   183      kind: ClusterRole
   184      name: system:service-account-issuer-discovery
   185    subjects:
   186    - apiGroup: rbac.authorization.k8s.io
   187      kind: Group
   188      name: system:serviceaccounts
   189  - apiVersion: rbac.authorization.k8s.io/v1
   190    kind: ClusterRoleBinding
   191    metadata:
   192      annotations:
   193        rbac.authorization.kubernetes.io/autoupdate: "true"
   194      creationTimestamp: null
   195      labels:
   196        kubernetes.io/bootstrapping: rbac-defaults
   197      name: system:volume-scheduler
   198    roleRef:
   199      apiGroup: rbac.authorization.k8s.io
   200      kind: ClusterRole
   201      name: system:volume-scheduler
   202    subjects:
   203    - apiGroup: rbac.authorization.k8s.io
   204      kind: User
   205      name: system:kube-scheduler
   206  kind: List
   207  metadata: {}