k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml (about)

     1  apiVersion: v1
     2  items:
     3  - apiVersion: rbac.authorization.k8s.io/v1
     4    kind: ClusterRoleBinding
     5    metadata:
     6      annotations:
     7        rbac.authorization.kubernetes.io/autoupdate: "true"
     8      creationTimestamp: null
     9      labels:
    10        kubernetes.io/bootstrapping: rbac-defaults
    11      name: system:controller:attachdetach-controller
    12    roleRef:
    13      apiGroup: rbac.authorization.k8s.io
    14      kind: ClusterRole
    15      name: system:controller:attachdetach-controller
    16    subjects:
    17    - kind: ServiceAccount
    18      name: attachdetach-controller
    19      namespace: kube-system
    20  - apiVersion: rbac.authorization.k8s.io/v1
    21    kind: ClusterRoleBinding
    22    metadata:
    23      annotations:
    24        rbac.authorization.kubernetes.io/autoupdate: "true"
    25      creationTimestamp: null
    26      labels:
    27        kubernetes.io/bootstrapping: rbac-defaults
    28      name: system:controller:certificate-controller
    29    roleRef:
    30      apiGroup: rbac.authorization.k8s.io
    31      kind: ClusterRole
    32      name: system:controller:certificate-controller
    33    subjects:
    34    - kind: ServiceAccount
    35      name: certificate-controller
    36      namespace: kube-system
    37  - apiVersion: rbac.authorization.k8s.io/v1
    38    kind: ClusterRoleBinding
    39    metadata:
    40      annotations:
    41        rbac.authorization.kubernetes.io/autoupdate: "true"
    42      creationTimestamp: null
    43      labels:
    44        kubernetes.io/bootstrapping: rbac-defaults
    45      name: system:controller:clusterrole-aggregation-controller
    46    roleRef:
    47      apiGroup: rbac.authorization.k8s.io
    48      kind: ClusterRole
    49      name: system:controller:clusterrole-aggregation-controller
    50    subjects:
    51    - kind: ServiceAccount
    52      name: clusterrole-aggregation-controller
    53      namespace: kube-system
    54  - apiVersion: rbac.authorization.k8s.io/v1
    55    kind: ClusterRoleBinding
    56    metadata:
    57      annotations:
    58        rbac.authorization.kubernetes.io/autoupdate: "true"
    59      creationTimestamp: null
    60      labels:
    61        kubernetes.io/bootstrapping: rbac-defaults
    62      name: system:controller:cronjob-controller
    63    roleRef:
    64      apiGroup: rbac.authorization.k8s.io
    65      kind: ClusterRole
    66      name: system:controller:cronjob-controller
    67    subjects:
    68    - kind: ServiceAccount
    69      name: cronjob-controller
    70      namespace: kube-system
    71  - apiVersion: rbac.authorization.k8s.io/v1
    72    kind: ClusterRoleBinding
    73    metadata:
    74      annotations:
    75        rbac.authorization.kubernetes.io/autoupdate: "true"
    76      creationTimestamp: null
    77      labels:
    78        kubernetes.io/bootstrapping: rbac-defaults
    79      name: system:controller:daemon-set-controller
    80    roleRef:
    81      apiGroup: rbac.authorization.k8s.io
    82      kind: ClusterRole
    83      name: system:controller:daemon-set-controller
    84    subjects:
    85    - kind: ServiceAccount
    86      name: daemon-set-controller
    87      namespace: kube-system
    88  - apiVersion: rbac.authorization.k8s.io/v1
    89    kind: ClusterRoleBinding
    90    metadata:
    91      annotations:
    92        rbac.authorization.kubernetes.io/autoupdate: "true"
    93      creationTimestamp: null
    94      labels:
    95        kubernetes.io/bootstrapping: rbac-defaults
    96      name: system:controller:deployment-controller
    97    roleRef:
    98      apiGroup: rbac.authorization.k8s.io
    99      kind: ClusterRole
   100      name: system:controller:deployment-controller
   101    subjects:
   102    - kind: ServiceAccount
   103      name: deployment-controller
   104      namespace: kube-system
   105  - apiVersion: rbac.authorization.k8s.io/v1
   106    kind: ClusterRoleBinding
   107    metadata:
   108      annotations:
   109        rbac.authorization.kubernetes.io/autoupdate: "true"
   110      creationTimestamp: null
   111      labels:
   112        kubernetes.io/bootstrapping: rbac-defaults
   113      name: system:controller:disruption-controller
   114    roleRef:
   115      apiGroup: rbac.authorization.k8s.io
   116      kind: ClusterRole
   117      name: system:controller:disruption-controller
   118    subjects:
   119    - kind: ServiceAccount
   120      name: disruption-controller
   121      namespace: kube-system
   122  - apiVersion: rbac.authorization.k8s.io/v1
   123    kind: ClusterRoleBinding
   124    metadata:
   125      annotations:
   126        rbac.authorization.kubernetes.io/autoupdate: "true"
   127      creationTimestamp: null
   128      labels:
   129        kubernetes.io/bootstrapping: rbac-defaults
   130      name: system:controller:endpoint-controller
   131    roleRef:
   132      apiGroup: rbac.authorization.k8s.io
   133      kind: ClusterRole
   134      name: system:controller:endpoint-controller
   135    subjects:
   136    - kind: ServiceAccount
   137      name: endpoint-controller
   138      namespace: kube-system
   139  - apiVersion: rbac.authorization.k8s.io/v1
   140    kind: ClusterRoleBinding
   141    metadata:
   142      annotations:
   143        rbac.authorization.kubernetes.io/autoupdate: "true"
   144      creationTimestamp: null
   145      labels:
   146        kubernetes.io/bootstrapping: rbac-defaults
   147      name: system:controller:endpointslice-controller
   148    roleRef:
   149      apiGroup: rbac.authorization.k8s.io
   150      kind: ClusterRole
   151      name: system:controller:endpointslice-controller
   152    subjects:
   153    - kind: ServiceAccount
   154      name: endpointslice-controller
   155      namespace: kube-system
   156  - apiVersion: rbac.authorization.k8s.io/v1
   157    kind: ClusterRoleBinding
   158    metadata:
   159      annotations:
   160        rbac.authorization.kubernetes.io/autoupdate: "true"
   161      creationTimestamp: null
   162      labels:
   163        kubernetes.io/bootstrapping: rbac-defaults
   164      name: system:controller:endpointslicemirroring-controller
   165    roleRef:
   166      apiGroup: rbac.authorization.k8s.io
   167      kind: ClusterRole
   168      name: system:controller:endpointslicemirroring-controller
   169    subjects:
   170    - kind: ServiceAccount
   171      name: endpointslicemirroring-controller
   172      namespace: kube-system
   173  - apiVersion: rbac.authorization.k8s.io/v1
   174    kind: ClusterRoleBinding
   175    metadata:
   176      annotations:
   177        rbac.authorization.kubernetes.io/autoupdate: "true"
   178      creationTimestamp: null
   179      labels:
   180        kubernetes.io/bootstrapping: rbac-defaults
   181      name: system:controller:ephemeral-volume-controller
   182    roleRef:
   183      apiGroup: rbac.authorization.k8s.io
   184      kind: ClusterRole
   185      name: system:controller:ephemeral-volume-controller
   186    subjects:
   187    - kind: ServiceAccount
   188      name: ephemeral-volume-controller
   189      namespace: kube-system
   190  - apiVersion: rbac.authorization.k8s.io/v1
   191    kind: ClusterRoleBinding
   192    metadata:
   193      annotations:
   194        rbac.authorization.kubernetes.io/autoupdate: "true"
   195      creationTimestamp: null
   196      labels:
   197        kubernetes.io/bootstrapping: rbac-defaults
   198      name: system:controller:expand-controller
   199    roleRef:
   200      apiGroup: rbac.authorization.k8s.io
   201      kind: ClusterRole
   202      name: system:controller:expand-controller
   203    subjects:
   204    - kind: ServiceAccount
   205      name: expand-controller
   206      namespace: kube-system
   207  - apiVersion: rbac.authorization.k8s.io/v1
   208    kind: ClusterRoleBinding
   209    metadata:
   210      annotations:
   211        rbac.authorization.kubernetes.io/autoupdate: "true"
   212      creationTimestamp: null
   213      labels:
   214        kubernetes.io/bootstrapping: rbac-defaults
   215      name: system:controller:generic-garbage-collector
   216    roleRef:
   217      apiGroup: rbac.authorization.k8s.io
   218      kind: ClusterRole
   219      name: system:controller:generic-garbage-collector
   220    subjects:
   221    - kind: ServiceAccount
   222      name: generic-garbage-collector
   223      namespace: kube-system
   224  - apiVersion: rbac.authorization.k8s.io/v1
   225    kind: ClusterRoleBinding
   226    metadata:
   227      annotations:
   228        rbac.authorization.kubernetes.io/autoupdate: "true"
   229      creationTimestamp: null
   230      labels:
   231        kubernetes.io/bootstrapping: rbac-defaults
   232      name: system:controller:horizontal-pod-autoscaler
   233    roleRef:
   234      apiGroup: rbac.authorization.k8s.io
   235      kind: ClusterRole
   236      name: system:controller:horizontal-pod-autoscaler
   237    subjects:
   238    - kind: ServiceAccount
   239      name: horizontal-pod-autoscaler
   240      namespace: kube-system
   241  - apiVersion: rbac.authorization.k8s.io/v1
   242    kind: ClusterRoleBinding
   243    metadata:
   244      annotations:
   245        rbac.authorization.kubernetes.io/autoupdate: "true"
   246      creationTimestamp: null
   247      labels:
   248        kubernetes.io/bootstrapping: rbac-defaults
   249      name: system:controller:job-controller
   250    roleRef:
   251      apiGroup: rbac.authorization.k8s.io
   252      kind: ClusterRole
   253      name: system:controller:job-controller
   254    subjects:
   255    - kind: ServiceAccount
   256      name: job-controller
   257      namespace: kube-system
   258  - apiVersion: rbac.authorization.k8s.io/v1
   259    kind: ClusterRoleBinding
   260    metadata:
   261      annotations:
   262        rbac.authorization.kubernetes.io/autoupdate: "true"
   263      creationTimestamp: null
   264      labels:
   265        kubernetes.io/bootstrapping: rbac-defaults
   266      name: system:controller:legacy-service-account-token-cleaner
   267    roleRef:
   268      apiGroup: rbac.authorization.k8s.io
   269      kind: ClusterRole
   270      name: system:controller:legacy-service-account-token-cleaner
   271    subjects:
   272    - kind: ServiceAccount
   273      name: legacy-service-account-token-cleaner
   274      namespace: kube-system
   275  - apiVersion: rbac.authorization.k8s.io/v1
   276    kind: ClusterRoleBinding
   277    metadata:
   278      annotations:
   279        rbac.authorization.kubernetes.io/autoupdate: "true"
   280      creationTimestamp: null
   281      labels:
   282        kubernetes.io/bootstrapping: rbac-defaults
   283      name: system:controller:namespace-controller
   284    roleRef:
   285      apiGroup: rbac.authorization.k8s.io
   286      kind: ClusterRole
   287      name: system:controller:namespace-controller
   288    subjects:
   289    - kind: ServiceAccount
   290      name: namespace-controller
   291      namespace: kube-system
   292  - apiVersion: rbac.authorization.k8s.io/v1
   293    kind: ClusterRoleBinding
   294    metadata:
   295      annotations:
   296        rbac.authorization.kubernetes.io/autoupdate: "true"
   297      creationTimestamp: null
   298      labels:
   299        kubernetes.io/bootstrapping: rbac-defaults
   300      name: system:controller:node-controller
   301    roleRef:
   302      apiGroup: rbac.authorization.k8s.io
   303      kind: ClusterRole
   304      name: system:controller:node-controller
   305    subjects:
   306    - kind: ServiceAccount
   307      name: node-controller
   308      namespace: kube-system
   309  - apiVersion: rbac.authorization.k8s.io/v1
   310    kind: ClusterRoleBinding
   311    metadata:
   312      annotations:
   313        rbac.authorization.kubernetes.io/autoupdate: "true"
   314      creationTimestamp: null
   315      labels:
   316        kubernetes.io/bootstrapping: rbac-defaults
   317      name: system:controller:persistent-volume-binder
   318    roleRef:
   319      apiGroup: rbac.authorization.k8s.io
   320      kind: ClusterRole
   321      name: system:controller:persistent-volume-binder
   322    subjects:
   323    - kind: ServiceAccount
   324      name: persistent-volume-binder
   325      namespace: kube-system
   326  - apiVersion: rbac.authorization.k8s.io/v1
   327    kind: ClusterRoleBinding
   328    metadata:
   329      annotations:
   330        rbac.authorization.kubernetes.io/autoupdate: "true"
   331      creationTimestamp: null
   332      labels:
   333        kubernetes.io/bootstrapping: rbac-defaults
   334      name: system:controller:pod-garbage-collector
   335    roleRef:
   336      apiGroup: rbac.authorization.k8s.io
   337      kind: ClusterRole
   338      name: system:controller:pod-garbage-collector
   339    subjects:
   340    - kind: ServiceAccount
   341      name: pod-garbage-collector
   342      namespace: kube-system
   343  - apiVersion: rbac.authorization.k8s.io/v1
   344    kind: ClusterRoleBinding
   345    metadata:
   346      annotations:
   347        rbac.authorization.kubernetes.io/autoupdate: "true"
   348      creationTimestamp: null
   349      labels:
   350        kubernetes.io/bootstrapping: rbac-defaults
   351      name: system:controller:pv-protection-controller
   352    roleRef:
   353      apiGroup: rbac.authorization.k8s.io
   354      kind: ClusterRole
   355      name: system:controller:pv-protection-controller
   356    subjects:
   357    - kind: ServiceAccount
   358      name: pv-protection-controller
   359      namespace: kube-system
   360  - apiVersion: rbac.authorization.k8s.io/v1
   361    kind: ClusterRoleBinding
   362    metadata:
   363      annotations:
   364        rbac.authorization.kubernetes.io/autoupdate: "true"
   365      creationTimestamp: null
   366      labels:
   367        kubernetes.io/bootstrapping: rbac-defaults
   368      name: system:controller:pvc-protection-controller
   369    roleRef:
   370      apiGroup: rbac.authorization.k8s.io
   371      kind: ClusterRole
   372      name: system:controller:pvc-protection-controller
   373    subjects:
   374    - kind: ServiceAccount
   375      name: pvc-protection-controller
   376      namespace: kube-system
   377  - apiVersion: rbac.authorization.k8s.io/v1
   378    kind: ClusterRoleBinding
   379    metadata:
   380      annotations:
   381        rbac.authorization.kubernetes.io/autoupdate: "true"
   382      creationTimestamp: null
   383      labels:
   384        kubernetes.io/bootstrapping: rbac-defaults
   385      name: system:controller:replicaset-controller
   386    roleRef:
   387      apiGroup: rbac.authorization.k8s.io
   388      kind: ClusterRole
   389      name: system:controller:replicaset-controller
   390    subjects:
   391    - kind: ServiceAccount
   392      name: replicaset-controller
   393      namespace: kube-system
   394  - apiVersion: rbac.authorization.k8s.io/v1
   395    kind: ClusterRoleBinding
   396    metadata:
   397      annotations:
   398        rbac.authorization.kubernetes.io/autoupdate: "true"
   399      creationTimestamp: null
   400      labels:
   401        kubernetes.io/bootstrapping: rbac-defaults
   402      name: system:controller:replication-controller
   403    roleRef:
   404      apiGroup: rbac.authorization.k8s.io
   405      kind: ClusterRole
   406      name: system:controller:replication-controller
   407    subjects:
   408    - kind: ServiceAccount
   409      name: replication-controller
   410      namespace: kube-system
   411  - apiVersion: rbac.authorization.k8s.io/v1
   412    kind: ClusterRoleBinding
   413    metadata:
   414      annotations:
   415        rbac.authorization.kubernetes.io/autoupdate: "true"
   416      creationTimestamp: null
   417      labels:
   418        kubernetes.io/bootstrapping: rbac-defaults
   419      name: system:controller:resourcequota-controller
   420    roleRef:
   421      apiGroup: rbac.authorization.k8s.io
   422      kind: ClusterRole
   423      name: system:controller:resourcequota-controller
   424    subjects:
   425    - kind: ServiceAccount
   426      name: resourcequota-controller
   427      namespace: kube-system
   428  - apiVersion: rbac.authorization.k8s.io/v1
   429    kind: ClusterRoleBinding
   430    metadata:
   431      annotations:
   432        rbac.authorization.kubernetes.io/autoupdate: "true"
   433      creationTimestamp: null
   434      labels:
   435        kubernetes.io/bootstrapping: rbac-defaults
   436      name: system:controller:root-ca-cert-publisher
   437    roleRef:
   438      apiGroup: rbac.authorization.k8s.io
   439      kind: ClusterRole
   440      name: system:controller:root-ca-cert-publisher
   441    subjects:
   442    - kind: ServiceAccount
   443      name: root-ca-cert-publisher
   444      namespace: kube-system
   445  - apiVersion: rbac.authorization.k8s.io/v1
   446    kind: ClusterRoleBinding
   447    metadata:
   448      annotations:
   449        rbac.authorization.kubernetes.io/autoupdate: "true"
   450      creationTimestamp: null
   451      labels:
   452        kubernetes.io/bootstrapping: rbac-defaults
   453      name: system:controller:route-controller
   454    roleRef:
   455      apiGroup: rbac.authorization.k8s.io
   456      kind: ClusterRole
   457      name: system:controller:route-controller
   458    subjects:
   459    - kind: ServiceAccount
   460      name: route-controller
   461      namespace: kube-system
   462  - apiVersion: rbac.authorization.k8s.io/v1
   463    kind: ClusterRoleBinding
   464    metadata:
   465      annotations:
   466        rbac.authorization.kubernetes.io/autoupdate: "true"
   467      creationTimestamp: null
   468      labels:
   469        kubernetes.io/bootstrapping: rbac-defaults
   470      name: system:controller:service-account-controller
   471    roleRef:
   472      apiGroup: rbac.authorization.k8s.io
   473      kind: ClusterRole
   474      name: system:controller:service-account-controller
   475    subjects:
   476    - kind: ServiceAccount
   477      name: service-account-controller
   478      namespace: kube-system
   479  - apiVersion: rbac.authorization.k8s.io/v1
   480    kind: ClusterRoleBinding
   481    metadata:
   482      annotations:
   483        rbac.authorization.kubernetes.io/autoupdate: "true"
   484      creationTimestamp: null
   485      labels:
   486        kubernetes.io/bootstrapping: rbac-defaults
   487      name: system:controller:service-controller
   488    roleRef:
   489      apiGroup: rbac.authorization.k8s.io
   490      kind: ClusterRole
   491      name: system:controller:service-controller
   492    subjects:
   493    - kind: ServiceAccount
   494      name: service-controller
   495      namespace: kube-system
   496  - apiVersion: rbac.authorization.k8s.io/v1
   497    kind: ClusterRoleBinding
   498    metadata:
   499      annotations:
   500        rbac.authorization.kubernetes.io/autoupdate: "true"
   501      creationTimestamp: null
   502      labels:
   503        kubernetes.io/bootstrapping: rbac-defaults
   504      name: system:controller:statefulset-controller
   505    roleRef:
   506      apiGroup: rbac.authorization.k8s.io
   507      kind: ClusterRole
   508      name: system:controller:statefulset-controller
   509    subjects:
   510    - kind: ServiceAccount
   511      name: statefulset-controller
   512      namespace: kube-system
   513  - apiVersion: rbac.authorization.k8s.io/v1
   514    kind: ClusterRoleBinding
   515    metadata:
   516      annotations:
   517        rbac.authorization.kubernetes.io/autoupdate: "true"
   518      creationTimestamp: null
   519      labels:
   520        kubernetes.io/bootstrapping: rbac-defaults
   521      name: system:controller:ttl-after-finished-controller
   522    roleRef:
   523      apiGroup: rbac.authorization.k8s.io
   524      kind: ClusterRole
   525      name: system:controller:ttl-after-finished-controller
   526    subjects:
   527    - kind: ServiceAccount
   528      name: ttl-after-finished-controller
   529      namespace: kube-system
   530  - apiVersion: rbac.authorization.k8s.io/v1
   531    kind: ClusterRoleBinding
   532    metadata:
   533      annotations:
   534        rbac.authorization.kubernetes.io/autoupdate: "true"
   535      creationTimestamp: null
   536      labels:
   537        kubernetes.io/bootstrapping: rbac-defaults
   538      name: system:controller:ttl-controller
   539    roleRef:
   540      apiGroup: rbac.authorization.k8s.io
   541      kind: ClusterRole
   542      name: system:controller:ttl-controller
   543    subjects:
   544    - kind: ServiceAccount
   545      name: ttl-controller
   546      namespace: kube-system
   547  - apiVersion: rbac.authorization.k8s.io/v1
   548    kind: ClusterRoleBinding
   549    metadata:
   550      annotations:
   551        rbac.authorization.kubernetes.io/autoupdate: "true"
   552      creationTimestamp: null
   553      labels:
   554        kubernetes.io/bootstrapping: rbac-defaults
   555      name: system:controller:validatingadmissionpolicy-status-controller
   556    roleRef:
   557      apiGroup: rbac.authorization.k8s.io
   558      kind: ClusterRole
   559      name: system:controller:validatingadmissionpolicy-status-controller
   560    subjects:
   561    - kind: ServiceAccount
   562      name: validatingadmissionpolicy-status-controller
   563      namespace: kube-system
   564  kind: List
   565  metadata: {}