55 lines
1.4 KiB
Django/Jinja
55 lines
1.4 KiB
Django/Jinja
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: psp:any:restricted
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: psp:restricted
|
|
subjects:
|
|
- kind: Group
|
|
name: system:authenticated
|
|
apiGroup: rbac.authorization.k8s.io
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: psp:kube-system:privileged
|
|
namespace: kube-system
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: psp:privileged
|
|
subjects:
|
|
- kind: Group
|
|
name: system:masters
|
|
apiGroup: rbac.authorization.k8s.io
|
|
- kind: Group
|
|
name: system:serviceaccounts:kube-system
|
|
apiGroup: rbac.authorization.k8s.io
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: psp:nodes:privileged
|
|
namespace: kube-system
|
|
annotations:
|
|
kubernetes.io/description: 'Allow nodes to create privileged pods. Should
|
|
be used in combination with the NodeRestriction admission plugin to limit
|
|
nodes to mirror pods bound to themselves.'
|
|
labels:
|
|
addonmanager.kubernetes.io/mode: Reconcile
|
|
kubernetes.io/cluster-service: 'true'
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: psp:privileged
|
|
subjects:
|
|
- kind: Group
|
|
apiGroup: rbac.authorization.k8s.io
|
|
name: system:nodes
|
|
- kind: User
|
|
apiGroup: rbac.authorization.k8s.io
|
|
# Legacy node ID
|
|
name: kubelet
|