k8s.io/kubernetes@v1.31.0-alpha.0.0.20240520171757-56147500dadc/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml (about) 1 apiVersion: v1 2 items: 3 - apiVersion: rbac.authorization.k8s.io/v1 4 kind: ClusterRoleBinding 5 metadata: 6 annotations: 7 rbac.authorization.kubernetes.io/autoupdate: "true" 8 creationTimestamp: null 9 labels: 10 kubernetes.io/bootstrapping: rbac-defaults 11 name: system:controller:attachdetach-controller 12 roleRef: 13 apiGroup: rbac.authorization.k8s.io 14 kind: ClusterRole 15 name: system:controller:attachdetach-controller 16 subjects: 17 - kind: ServiceAccount 18 name: attachdetach-controller 19 namespace: kube-system 20 - apiVersion: rbac.authorization.k8s.io/v1 21 kind: ClusterRoleBinding 22 metadata: 23 annotations: 24 rbac.authorization.kubernetes.io/autoupdate: "true" 25 creationTimestamp: null 26 labels: 27 kubernetes.io/bootstrapping: rbac-defaults 28 name: system:controller:certificate-controller 29 roleRef: 30 apiGroup: rbac.authorization.k8s.io 31 kind: ClusterRole 32 name: system:controller:certificate-controller 33 subjects: 34 - kind: ServiceAccount 35 name: certificate-controller 36 namespace: kube-system 37 - apiVersion: rbac.authorization.k8s.io/v1 38 kind: ClusterRoleBinding 39 metadata: 40 annotations: 41 rbac.authorization.kubernetes.io/autoupdate: "true" 42 creationTimestamp: null 43 labels: 44 kubernetes.io/bootstrapping: rbac-defaults 45 name: system:controller:clusterrole-aggregation-controller 46 roleRef: 47 apiGroup: rbac.authorization.k8s.io 48 kind: ClusterRole 49 name: system:controller:clusterrole-aggregation-controller 50 subjects: 51 - kind: ServiceAccount 52 name: clusterrole-aggregation-controller 53 namespace: kube-system 54 - apiVersion: rbac.authorization.k8s.io/v1 55 kind: ClusterRoleBinding 56 metadata: 57 annotations: 58 rbac.authorization.kubernetes.io/autoupdate: "true" 59 creationTimestamp: null 60 labels: 61 kubernetes.io/bootstrapping: rbac-defaults 62 name: system:controller:cronjob-controller 63 roleRef: 64 apiGroup: rbac.authorization.k8s.io 65 kind: ClusterRole 66 name: system:controller:cronjob-controller 67 subjects: 68 - kind: ServiceAccount 69 name: cronjob-controller 70 namespace: kube-system 71 - apiVersion: rbac.authorization.k8s.io/v1 72 kind: ClusterRoleBinding 73 metadata: 74 annotations: 75 rbac.authorization.kubernetes.io/autoupdate: "true" 76 creationTimestamp: null 77 labels: 78 kubernetes.io/bootstrapping: rbac-defaults 79 name: system:controller:daemon-set-controller 80 roleRef: 81 apiGroup: rbac.authorization.k8s.io 82 kind: ClusterRole 83 name: system:controller:daemon-set-controller 84 subjects: 85 - kind: ServiceAccount 86 name: daemon-set-controller 87 namespace: kube-system 88 - apiVersion: rbac.authorization.k8s.io/v1 89 kind: ClusterRoleBinding 90 metadata: 91 annotations: 92 rbac.authorization.kubernetes.io/autoupdate: "true" 93 creationTimestamp: null 94 labels: 95 kubernetes.io/bootstrapping: rbac-defaults 96 name: system:controller:deployment-controller 97 roleRef: 98 apiGroup: rbac.authorization.k8s.io 99 kind: ClusterRole 100 name: system:controller:deployment-controller 101 subjects: 102 - kind: ServiceAccount 103 name: deployment-controller 104 namespace: kube-system 105 - apiVersion: rbac.authorization.k8s.io/v1 106 kind: ClusterRoleBinding 107 metadata: 108 annotations: 109 rbac.authorization.kubernetes.io/autoupdate: "true" 110 creationTimestamp: null 111 labels: 112 kubernetes.io/bootstrapping: rbac-defaults 113 name: system:controller:disruption-controller 114 roleRef: 115 apiGroup: rbac.authorization.k8s.io 116 kind: ClusterRole 117 name: system:controller:disruption-controller 118 subjects: 119 - kind: ServiceAccount 120 name: disruption-controller 121 namespace: kube-system 122 - apiVersion: rbac.authorization.k8s.io/v1 123 kind: ClusterRoleBinding 124 metadata: 125 annotations: 126 rbac.authorization.kubernetes.io/autoupdate: "true" 127 creationTimestamp: null 128 labels: 129 kubernetes.io/bootstrapping: rbac-defaults 130 name: system:controller:endpoint-controller 131 roleRef: 132 apiGroup: rbac.authorization.k8s.io 133 kind: ClusterRole 134 name: system:controller:endpoint-controller 135 subjects: 136 - kind: ServiceAccount 137 name: endpoint-controller 138 namespace: kube-system 139 - apiVersion: rbac.authorization.k8s.io/v1 140 kind: ClusterRoleBinding 141 metadata: 142 annotations: 143 rbac.authorization.kubernetes.io/autoupdate: "true" 144 creationTimestamp: null 145 labels: 146 kubernetes.io/bootstrapping: rbac-defaults 147 name: system:controller:endpointslice-controller 148 roleRef: 149 apiGroup: rbac.authorization.k8s.io 150 kind: ClusterRole 151 name: system:controller:endpointslice-controller 152 subjects: 153 - kind: ServiceAccount 154 name: endpointslice-controller 155 namespace: kube-system 156 - apiVersion: rbac.authorization.k8s.io/v1 157 kind: ClusterRoleBinding 158 metadata: 159 annotations: 160 rbac.authorization.kubernetes.io/autoupdate: "true" 161 creationTimestamp: null 162 labels: 163 kubernetes.io/bootstrapping: rbac-defaults 164 name: system:controller:endpointslicemirroring-controller 165 roleRef: 166 apiGroup: rbac.authorization.k8s.io 167 kind: ClusterRole 168 name: system:controller:endpointslicemirroring-controller 169 subjects: 170 - kind: ServiceAccount 171 name: endpointslicemirroring-controller 172 namespace: kube-system 173 - apiVersion: rbac.authorization.k8s.io/v1 174 kind: ClusterRoleBinding 175 metadata: 176 annotations: 177 rbac.authorization.kubernetes.io/autoupdate: "true" 178 creationTimestamp: null 179 labels: 180 kubernetes.io/bootstrapping: rbac-defaults 181 name: system:controller:ephemeral-volume-controller 182 roleRef: 183 apiGroup: rbac.authorization.k8s.io 184 kind: ClusterRole 185 name: system:controller:ephemeral-volume-controller 186 subjects: 187 - kind: ServiceAccount 188 name: ephemeral-volume-controller 189 namespace: kube-system 190 - apiVersion: rbac.authorization.k8s.io/v1 191 kind: ClusterRoleBinding 192 metadata: 193 annotations: 194 rbac.authorization.kubernetes.io/autoupdate: "true" 195 creationTimestamp: null 196 labels: 197 kubernetes.io/bootstrapping: rbac-defaults 198 name: system:controller:expand-controller 199 roleRef: 200 apiGroup: rbac.authorization.k8s.io 201 kind: ClusterRole 202 name: system:controller:expand-controller 203 subjects: 204 - kind: ServiceAccount 205 name: expand-controller 206 namespace: kube-system 207 - apiVersion: rbac.authorization.k8s.io/v1 208 kind: ClusterRoleBinding 209 metadata: 210 annotations: 211 rbac.authorization.kubernetes.io/autoupdate: "true" 212 creationTimestamp: null 213 labels: 214 kubernetes.io/bootstrapping: rbac-defaults 215 name: system:controller:generic-garbage-collector 216 roleRef: 217 apiGroup: rbac.authorization.k8s.io 218 kind: ClusterRole 219 name: system:controller:generic-garbage-collector 220 subjects: 221 - kind: ServiceAccount 222 name: generic-garbage-collector 223 namespace: kube-system 224 - apiVersion: rbac.authorization.k8s.io/v1 225 kind: ClusterRoleBinding 226 metadata: 227 annotations: 228 rbac.authorization.kubernetes.io/autoupdate: "true" 229 creationTimestamp: null 230 labels: 231 kubernetes.io/bootstrapping: rbac-defaults 232 name: system:controller:horizontal-pod-autoscaler 233 roleRef: 234 apiGroup: rbac.authorization.k8s.io 235 kind: ClusterRole 236 name: system:controller:horizontal-pod-autoscaler 237 subjects: 238 - kind: ServiceAccount 239 name: horizontal-pod-autoscaler 240 namespace: kube-system 241 - apiVersion: rbac.authorization.k8s.io/v1 242 kind: ClusterRoleBinding 243 metadata: 244 annotations: 245 rbac.authorization.kubernetes.io/autoupdate: "true" 246 creationTimestamp: null 247 labels: 248 kubernetes.io/bootstrapping: rbac-defaults 249 name: system:controller:job-controller 250 roleRef: 251 apiGroup: rbac.authorization.k8s.io 252 kind: ClusterRole 253 name: system:controller:job-controller 254 subjects: 255 - kind: ServiceAccount 256 name: job-controller 257 namespace: kube-system 258 - apiVersion: rbac.authorization.k8s.io/v1 259 kind: ClusterRoleBinding 260 metadata: 261 annotations: 262 rbac.authorization.kubernetes.io/autoupdate: "true" 263 creationTimestamp: null 264 labels: 265 kubernetes.io/bootstrapping: rbac-defaults 266 name: system:controller:legacy-service-account-token-cleaner 267 roleRef: 268 apiGroup: rbac.authorization.k8s.io 269 kind: ClusterRole 270 name: system:controller:legacy-service-account-token-cleaner 271 subjects: 272 - kind: ServiceAccount 273 name: legacy-service-account-token-cleaner 274 namespace: kube-system 275 - apiVersion: rbac.authorization.k8s.io/v1 276 kind: ClusterRoleBinding 277 metadata: 278 annotations: 279 rbac.authorization.kubernetes.io/autoupdate: "true" 280 creationTimestamp: null 281 labels: 282 kubernetes.io/bootstrapping: rbac-defaults 283 name: system:controller:namespace-controller 284 roleRef: 285 apiGroup: rbac.authorization.k8s.io 286 kind: ClusterRole 287 name: system:controller:namespace-controller 288 subjects: 289 - kind: ServiceAccount 290 name: namespace-controller 291 namespace: kube-system 292 - apiVersion: rbac.authorization.k8s.io/v1 293 kind: ClusterRoleBinding 294 metadata: 295 annotations: 296 rbac.authorization.kubernetes.io/autoupdate: "true" 297 creationTimestamp: null 298 labels: 299 kubernetes.io/bootstrapping: rbac-defaults 300 name: system:controller:node-controller 301 roleRef: 302 apiGroup: rbac.authorization.k8s.io 303 kind: ClusterRole 304 name: system:controller:node-controller 305 subjects: 306 - kind: ServiceAccount 307 name: node-controller 308 namespace: kube-system 309 - apiVersion: rbac.authorization.k8s.io/v1 310 kind: ClusterRoleBinding 311 metadata: 312 annotations: 313 rbac.authorization.kubernetes.io/autoupdate: "true" 314 creationTimestamp: null 315 labels: 316 kubernetes.io/bootstrapping: rbac-defaults 317 name: system:controller:persistent-volume-binder 318 roleRef: 319 apiGroup: rbac.authorization.k8s.io 320 kind: ClusterRole 321 name: system:controller:persistent-volume-binder 322 subjects: 323 - kind: ServiceAccount 324 name: persistent-volume-binder 325 namespace: kube-system 326 - apiVersion: rbac.authorization.k8s.io/v1 327 kind: ClusterRoleBinding 328 metadata: 329 annotations: 330 rbac.authorization.kubernetes.io/autoupdate: "true" 331 creationTimestamp: null 332 labels: 333 kubernetes.io/bootstrapping: rbac-defaults 334 name: system:controller:pod-garbage-collector 335 roleRef: 336 apiGroup: rbac.authorization.k8s.io 337 kind: ClusterRole 338 name: system:controller:pod-garbage-collector 339 subjects: 340 - kind: ServiceAccount 341 name: pod-garbage-collector 342 namespace: kube-system 343 - apiVersion: rbac.authorization.k8s.io/v1 344 kind: ClusterRoleBinding 345 metadata: 346 annotations: 347 rbac.authorization.kubernetes.io/autoupdate: "true" 348 creationTimestamp: null 349 labels: 350 kubernetes.io/bootstrapping: rbac-defaults 351 name: system:controller:pv-protection-controller 352 roleRef: 353 apiGroup: rbac.authorization.k8s.io 354 kind: ClusterRole 355 name: system:controller:pv-protection-controller 356 subjects: 357 - kind: ServiceAccount 358 name: pv-protection-controller 359 namespace: kube-system 360 - apiVersion: rbac.authorization.k8s.io/v1 361 kind: ClusterRoleBinding 362 metadata: 363 annotations: 364 rbac.authorization.kubernetes.io/autoupdate: "true" 365 creationTimestamp: null 366 labels: 367 kubernetes.io/bootstrapping: rbac-defaults 368 name: system:controller:pvc-protection-controller 369 roleRef: 370 apiGroup: rbac.authorization.k8s.io 371 kind: ClusterRole 372 name: system:controller:pvc-protection-controller 373 subjects: 374 - kind: ServiceAccount 375 name: pvc-protection-controller 376 namespace: kube-system 377 - apiVersion: rbac.authorization.k8s.io/v1 378 kind: ClusterRoleBinding 379 metadata: 380 annotations: 381 rbac.authorization.kubernetes.io/autoupdate: "true" 382 creationTimestamp: null 383 labels: 384 kubernetes.io/bootstrapping: rbac-defaults 385 name: system:controller:replicaset-controller 386 roleRef: 387 apiGroup: rbac.authorization.k8s.io 388 kind: ClusterRole 389 name: system:controller:replicaset-controller 390 subjects: 391 - kind: ServiceAccount 392 name: replicaset-controller 393 namespace: kube-system 394 - apiVersion: rbac.authorization.k8s.io/v1 395 kind: ClusterRoleBinding 396 metadata: 397 annotations: 398 rbac.authorization.kubernetes.io/autoupdate: "true" 399 creationTimestamp: null 400 labels: 401 kubernetes.io/bootstrapping: rbac-defaults 402 name: system:controller:replication-controller 403 roleRef: 404 apiGroup: rbac.authorization.k8s.io 405 kind: ClusterRole 406 name: system:controller:replication-controller 407 subjects: 408 - kind: ServiceAccount 409 name: replication-controller 410 namespace: kube-system 411 - apiVersion: rbac.authorization.k8s.io/v1 412 kind: ClusterRoleBinding 413 metadata: 414 annotations: 415 rbac.authorization.kubernetes.io/autoupdate: "true" 416 creationTimestamp: null 417 labels: 418 kubernetes.io/bootstrapping: rbac-defaults 419 name: system:controller:resourcequota-controller 420 roleRef: 421 apiGroup: rbac.authorization.k8s.io 422 kind: ClusterRole 423 name: system:controller:resourcequota-controller 424 subjects: 425 - kind: ServiceAccount 426 name: resourcequota-controller 427 namespace: kube-system 428 - apiVersion: rbac.authorization.k8s.io/v1 429 kind: ClusterRoleBinding 430 metadata: 431 annotations: 432 rbac.authorization.kubernetes.io/autoupdate: "true" 433 creationTimestamp: null 434 labels: 435 kubernetes.io/bootstrapping: rbac-defaults 436 name: system:controller:root-ca-cert-publisher 437 roleRef: 438 apiGroup: rbac.authorization.k8s.io 439 kind: ClusterRole 440 name: system:controller:root-ca-cert-publisher 441 subjects: 442 - kind: ServiceAccount 443 name: root-ca-cert-publisher 444 namespace: kube-system 445 - apiVersion: rbac.authorization.k8s.io/v1 446 kind: ClusterRoleBinding 447 metadata: 448 annotations: 449 rbac.authorization.kubernetes.io/autoupdate: "true" 450 creationTimestamp: null 451 labels: 452 kubernetes.io/bootstrapping: rbac-defaults 453 name: system:controller:route-controller 454 roleRef: 455 apiGroup: rbac.authorization.k8s.io 456 kind: ClusterRole 457 name: system:controller:route-controller 458 subjects: 459 - kind: ServiceAccount 460 name: route-controller 461 namespace: kube-system 462 - apiVersion: rbac.authorization.k8s.io/v1 463 kind: ClusterRoleBinding 464 metadata: 465 annotations: 466 rbac.authorization.kubernetes.io/autoupdate: "true" 467 creationTimestamp: null 468 labels: 469 kubernetes.io/bootstrapping: rbac-defaults 470 name: system:controller:service-account-controller 471 roleRef: 472 apiGroup: rbac.authorization.k8s.io 473 kind: ClusterRole 474 name: system:controller:service-account-controller 475 subjects: 476 - kind: ServiceAccount 477 name: service-account-controller 478 namespace: kube-system 479 - apiVersion: rbac.authorization.k8s.io/v1 480 kind: ClusterRoleBinding 481 metadata: 482 annotations: 483 rbac.authorization.kubernetes.io/autoupdate: "true" 484 creationTimestamp: null 485 labels: 486 kubernetes.io/bootstrapping: rbac-defaults 487 name: system:controller:service-controller 488 roleRef: 489 apiGroup: rbac.authorization.k8s.io 490 kind: ClusterRole 491 name: system:controller:service-controller 492 subjects: 493 - kind: ServiceAccount 494 name: service-controller 495 namespace: kube-system 496 - apiVersion: rbac.authorization.k8s.io/v1 497 kind: ClusterRoleBinding 498 metadata: 499 annotations: 500 rbac.authorization.kubernetes.io/autoupdate: "true" 501 creationTimestamp: null 502 labels: 503 kubernetes.io/bootstrapping: rbac-defaults 504 name: system:controller:statefulset-controller 505 roleRef: 506 apiGroup: rbac.authorization.k8s.io 507 kind: ClusterRole 508 name: system:controller:statefulset-controller 509 subjects: 510 - kind: ServiceAccount 511 name: statefulset-controller 512 namespace: kube-system 513 - apiVersion: rbac.authorization.k8s.io/v1 514 kind: ClusterRoleBinding 515 metadata: 516 annotations: 517 rbac.authorization.kubernetes.io/autoupdate: "true" 518 creationTimestamp: null 519 labels: 520 kubernetes.io/bootstrapping: rbac-defaults 521 name: system:controller:ttl-after-finished-controller 522 roleRef: 523 apiGroup: rbac.authorization.k8s.io 524 kind: ClusterRole 525 name: system:controller:ttl-after-finished-controller 526 subjects: 527 - kind: ServiceAccount 528 name: ttl-after-finished-controller 529 namespace: kube-system 530 - apiVersion: rbac.authorization.k8s.io/v1 531 kind: ClusterRoleBinding 532 metadata: 533 annotations: 534 rbac.authorization.kubernetes.io/autoupdate: "true" 535 creationTimestamp: null 536 labels: 537 kubernetes.io/bootstrapping: rbac-defaults 538 name: system:controller:ttl-controller 539 roleRef: 540 apiGroup: rbac.authorization.k8s.io 541 kind: ClusterRole 542 name: system:controller:ttl-controller 543 subjects: 544 - kind: ServiceAccount 545 name: ttl-controller 546 namespace: kube-system 547 - apiVersion: rbac.authorization.k8s.io/v1 548 kind: ClusterRoleBinding 549 metadata: 550 annotations: 551 rbac.authorization.kubernetes.io/autoupdate: "true" 552 creationTimestamp: null 553 labels: 554 kubernetes.io/bootstrapping: rbac-defaults 555 name: system:controller:validatingadmissionpolicy-status-controller 556 roleRef: 557 apiGroup: rbac.authorization.k8s.io 558 kind: ClusterRole 559 name: system:controller:validatingadmissionpolicy-status-controller 560 subjects: 561 - kind: ServiceAccount 562 name: validatingadmissionpolicy-status-controller 563 namespace: kube-system 564 kind: List 565 metadata: {}