Merge pull request #51011 from xilabao/rbac-v1-in-yaml

Automatic merge from submit-queue (batch tested with PRs 50489, 51070, 51011, 51022, 51141)

update to rbac v1 in yaml file

**What this PR does / why we need it**:
ref to https://github.com/kubernetes/kubernetes/pull/49642
ref https://github.com/kubernetes/features/issues/2

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:
cc @liggitt 

**Release note**:

```release-note
NONE
```
This commit is contained in:
Kubernetes Submit Queue 2017-08-23 19:54:28 -07:00 committed by GitHub
commit 3b2e403a37
17 changed files with 28 additions and 28 deletions

View File

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: heapster-binding name: heapster-binding
@ -16,7 +16,7 @@ subjects:
--- ---
# Heapster's pod_nanny monitors the heapster deployment & its pod(s), and scales # Heapster's pod_nanny monitors the heapster deployment & its pod(s), and scales
# the resources of the deployment if necessary. # the resources of the deployment if necessary.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: system:pod-nanny name: system:pod-nanny
@ -39,7 +39,7 @@ rules:
- get - get
- update - update
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: heapster-binding name: heapster-binding

View File

@ -21,7 +21,7 @@ metadata:
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: system:kube-dns-autoscaler name: system:kube-dns-autoscaler
labels: labels:
@ -43,7 +43,7 @@ rules:
verbs: ["get", "create"] verbs: ["get", "create"]
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: system:kube-dns-autoscaler name: system:kube-dns-autoscaler
labels: labels:

View File

@ -10,7 +10,7 @@ metadata:
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: elasticsearch-logging name: elasticsearch-logging
labels: labels:
@ -28,7 +28,7 @@ rules:
- "get" - "get"
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
namespace: kube-system namespace: kube-system
name: elasticsearch-logging name: elasticsearch-logging

View File

@ -9,7 +9,7 @@ metadata:
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: fluentd-es name: fluentd-es
labels: labels:
@ -28,7 +28,7 @@ rules:
- "list" - "list"
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: fluentd-es name: fluentd-es
labels: labels:

View File

@ -8,7 +8,7 @@ metadata:
kubernetes.io/cluster-service: "true" kubernetes.io/cluster-service: "true"
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: event-exporter-rb name: event-exporter-rb

View File

@ -7,7 +7,7 @@ metadata:
kubernetes.io/cluster-service: "true" kubernetes.io/cluster-service: "true"
addonmanager.kubernetes.io/mode: Reconcile addonmanager.kubernetes.io/mode: Reconcile
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: npd-binding name: npd-binding

View File

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: npd-binding name: npd-binding

View File

@ -1,5 +1,5 @@
# This binding gives the kube-apiserver user full access to the kubelet API # This binding gives the kube-apiserver user full access to the kubelet API
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kube-apiserver-kubelet-api-admin name: kube-apiserver-kubelet-api-admin

View File

@ -1,5 +1,5 @@
# This role allows full access to the kubelet API # This role allows full access to the kubelet API
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: kubelet-api-admin name: kubelet-api-admin

View File

@ -2,7 +2,7 @@
# identify the system:nodes group. They use the kubelet identity # identify the system:nodes group. They use the kubelet identity
# TODO: remove this once new nodes are granted individual identities and the # TODO: remove this once new nodes are granted individual identities and the
# NodeAuthorizer is enabled. # NodeAuthorizer is enabled.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kubelet-cluster-admin name: kubelet-cluster-admin

View File

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: gce:beta:kubelet-certificate-bootstrap name: gce:beta:kubelet-certificate-bootstrap
@ -14,7 +14,7 @@ subjects:
kind: User kind: User
name: kubelet name: kubelet
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: gce:beta:kubelet-certificate-rotation name: gce:beta:kubelet-certificate-rotation
@ -30,7 +30,7 @@ subjects:
kind: Group kind: Group
name: system:nodes name: system:nodes
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: gce:beta:kubelet-certificate-bootstrap name: gce:beta:kubelet-certificate-bootstrap
@ -45,7 +45,7 @@ rules:
verbs: verbs:
- "create" - "create"
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: gce:beta:kubelet-certificate-rotation name: gce:beta:kubelet-certificate-rotation

View File

@ -1,6 +1,6 @@
# privilegedPSP gives the privilegedPSP role # privilegedPSP gives the privilegedPSP role
# to the group privileged. # to the group privileged.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: privileged-psp-users name: privileged-psp-users
@ -15,7 +15,7 @@ roleRef:
--- ---
# restrictedPSP grants the restrictedPSP role to # restrictedPSP grants the restrictedPSP role to
# the groups restricted and privileged. # the groups restricted and privileged.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: restricted-psp-users name: restricted-psp-users
@ -33,7 +33,7 @@ roleRef:
--- ---
# edit grants edit role to the groups # edit grants edit role to the groups
# restricted and privileged. # restricted and privileged.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: edit name: edit

View File

@ -1,6 +1,6 @@
# restrictedPSP grants access to use # restrictedPSP grants access to use
# the restricted PSP. # the restricted PSP.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: restricted-psp-user name: restricted-psp-user
@ -16,7 +16,7 @@ rules:
--- ---
# privilegedPSP grants access to use the privileged # privilegedPSP grants access to use the privileged
# PSP. # PSP.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: privileged-psp-user name: privileged-psp-user

View File

@ -1,5 +1,5 @@
# This is the role binding for the kubemark heapster. # This is the role binding for the kubemark heapster.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: heapster-view-binding name: heapster-view-binding

View File

@ -2,7 +2,7 @@
# used for listing hollow-nodes in start-kubemark.sh and # used for listing hollow-nodes in start-kubemark.sh and
# send resource creation requests, etc in run-e2e-tests.sh. # send resource creation requests, etc in run-e2e-tests.sh.
# Also useful if you manually want to use local kubectl. # Also useful if you manually want to use local kubectl.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kubecfg-cluster-admin name: kubecfg-cluster-admin

View File

@ -2,7 +2,7 @@
# #
# TODO: give each kubelet a credential in the system:nodes group with username system:node:<nodeName>, # TODO: give each kubelet a credential in the system:nodes group with username system:node:<nodeName>,
# to exercise the Node authorizer and admission, then remove this binding # to exercise the Node authorizer and admission, then remove this binding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kubelet-node name: kubelet-node

View File

@ -1,5 +1,5 @@
# This is the role binding for the node-problem-detector. # This is the role binding for the node-problem-detector.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: node-problem-detector-binding name: node-problem-detector-binding