cri-o/vendor/k8s.io/kubernetes/cluster/addons/e2e-rbac-bindings/kubelet-binding.yaml

20 lines
615 B
YAML
Raw Normal View History

# The GKE environments don't have kubelets with certificates that
# identify the system:nodes group. They use the kubelet identity
# TODO cjcullen should figure out how wants to manage his upgrade
# this will only hold the e2e tests until we get an authorizer
# which authorizes particular nodes
apiVersion: rbac.authorization.k8s.io/v1alpha1
kind: ClusterRoleBinding
metadata:
name: kubelet-cluster-admin
labels:
kubernetes.io/cluster-service: "true"
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:node
subjects:
- apiVersion: rbac/v1alpha1
kind: User
name: kubelet