Skip to content

Commit 9a4aff9

Browse files
authored
Merge pull request #22677 from sftim/20200723_rbac_mark_table_header
Mark RBAC table header as header
2 parents cc78d30 + e7c2510 commit 9a4aff9

File tree

1 file changed

+20
-4
lines changed
  • content/en/docs/reference/access-authn-authz

1 file changed

+20
-4
lines changed

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -606,12 +606,15 @@ either do not manually edit the role, or disable auto-reconciliation.
606606

607607
<table>
608608
<caption>Kubernetes RBAC API discovery roles</caption>
609-
<colgroup><col width="25%" /><col width="25%" /><col /></colgroup>
609+
<colgroup><col style="width: 25%;" /><col style="width: 25%;" /><col /></colgroup>
610+
<thead>
610611
<tr>
611612
<th>Default ClusterRole</th>
612613
<th>Default ClusterRoleBinding</th>
613614
<th>Description</th>
614615
</tr>
616+
</thead>
617+
<tbody>
615618
<tr>
616619
<td><b>system:basic-user</b></td>
617620
<td><b>system:authenticated</b> group</td>
@@ -627,6 +630,7 @@ either do not manually edit the role, or disable auto-reconciliation.
627630
<td><b>system:authenticated</b> and <b>system:unauthenticated</b> groups</td>
628631
<td>Allows read-only access to non-sensitive information about the cluster. Introduced in Kubernetes v1.14.</td>
629632
</tr>
633+
</tbody>
630634
</table>
631635

632636
### User-facing roles
@@ -649,12 +653,15 @@ metadata:
649653
```
650654

651655
<table>
652-
<colgroup><col width="25%"><col width="25%"><col></colgroup>
656+
<colgroup><col style="width: 25%;" /><col style="width: 25%;" /><col /></colgroup>
657+
<thead>
653658
<tr>
654659
<th>Default ClusterRole</th>
655660
<th>Default ClusterRoleBinding</th>
656661
<th>Description</th>
657662
</tr>
663+
</thead>
664+
<tbody>
658665
<tr>
659666
<td><b>cluster-admin</b></td>
660667
<td><b>system:masters</b> group</td>
@@ -691,17 +698,21 @@ the contents of Secrets enables access to ServiceAccount credentials
691698
in the namespace, which would allow API access as any ServiceAccount
692699
in the namespace (a form of privilege escalation).</td>
693700
</tr>
701+
</tbody>
694702
</table>
695703

696704
### Core component roles
697705

698706
<table>
699-
<colgroup><col width="25%"><col width="25%"><col></colgroup>
707+
<colgroup><col style="width: 25%;" /><col style="width: 25%;" /><col /></colgroup>
708+
<thead>
700709
<tr>
701710
<th>Default ClusterRole</th>
702711
<th>Default ClusterRoleBinding</th>
703712
<th>Description</th>
704713
</tr>
714+
</thead>
715+
<tbody>
705716
<tr>
706717
<td><b>system:kube-scheduler</b></td>
707718
<td><b>system:kube-scheduler</b> user</td>
@@ -733,17 +744,21 @@ The <tt>system:node</tt> role only exists for compatibility with Kubernetes clus
733744
<td><b>system:kube-proxy</b> user</td>
734745
<td>Allows access to the resources required by the {{< glossary_tooltip term_id="kube-proxy" text="kube-proxy" >}} component.</td>
735746
</tr>
747+
</tbody>
736748
</table>
737749

738750
### Other component roles
739751

740752
<table>
741-
<colgroup><col width="25%"><col width="25%"><col></colgroup>
753+
<colgroup><col style="width: 25%;" /><col style="width: 25%;" /><col /></colgroup>
754+
<thead>
742755
<tr>
743756
<th>Default ClusterRole</th>
744757
<th>Default ClusterRoleBinding</th>
745758
<th>Description</th>
746759
</tr>
760+
</thead>
761+
<tbody>
747762
<tr>
748763
<td><b>system:auth-delegator</b></td>
749764
<td>None</td>
@@ -786,6 +801,7 @@ This is commonly used by add-on API servers for unified authentication and autho
786801
<td>None</td>
787802
<td>Allows access to the resources required by most <a href="/docs/concepts/storage/persistent-volumes/#provisioner">dynamic volume provisioners</a>.</td>
788803
</tr>
804+
<tbody>
789805
</table>
790806

791807
### Roles for built-in controllers {#controller-roles}

0 commit comments

Comments
 (0)