diff --git a/charts/kyverno/templates/clusterrole.yaml b/charts/kyverno/templates/clusterrole.yaml index de491794a9..30bf4f4f38 100644 --- a/charts/kyverno/templates/clusterrole.yaml +++ b/charts/kyverno/templates/clusterrole.yaml @@ -1,16 +1,6 @@ {{- if .Values.rbac.create }} apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole -metadata: - name: {{ template "kyverno.fullname" . }}:policyviolations -rules: -- apiGroups: ["kyverno.io"] - resources: - - policyviolations - verbs: ["get", "list", "watch", "delete"] ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole metadata: name: {{ template "kyverno.fullname" . }}:webhook rules: diff --git a/charts/kyverno/templates/clusterrolebinding.yaml b/charts/kyverno/templates/clusterrolebinding.yaml index 64ddb379ff..3ae1dcc6c4 100644 --- a/charts/kyverno/templates/clusterrolebinding.yaml +++ b/charts/kyverno/templates/clusterrolebinding.yaml @@ -1,17 +1,4 @@ {{- if .Values.rbac.create }} -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: {{ template "kyverno.fullname" . }}:policyviolations -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: {{ template "kyverno.fullname" . }}:policyviolations -subjects: -- kind: ServiceAccount - name: {{ template "kyverno.serviceAccountName" . }} - namespace: {{ template "kyverno.namespace" . }} ---- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: diff --git a/definitions/install.yaml b/definitions/install.yaml index eaa1d5ba01..ee1ec3af32 100644 --- a/definitions/install.yaml +++ b/definitions/install.yaml @@ -2875,21 +2875,6 @@ rules: verbs: - approve --- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - name: kyverno:policyviolations -rules: -- apiGroups: - - kyverno.io - resources: - - policyviolations - verbs: - - get - - list - - watch - - delete ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -2931,19 +2916,6 @@ subjects: --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding -metadata: - name: kyverno:policyviolations -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kyverno:policyviolations -subjects: -- kind: ServiceAccount - name: kyverno-service-account - namespace: kyverno ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding metadata: name: kyverno:userinfo roleRef: diff --git a/definitions/install_debug.yaml b/definitions/install_debug.yaml index 49905ed047..1c151c9359 100755 --- a/definitions/install_debug.yaml +++ b/definitions/install_debug.yaml @@ -2875,21 +2875,6 @@ rules: verbs: - approve --- -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - name: kyverno:policyviolations -rules: -- apiGroups: - - kyverno.io - resources: - - policyviolations - verbs: - - get - - list - - watch - - delete ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -2931,19 +2916,6 @@ subjects: --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding -metadata: - name: kyverno:policyviolations -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kyverno:policyviolations -subjects: -- kind: ServiceAccount - name: kyverno-service-account - namespace: kyverno ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding metadata: name: kyverno:userinfo roleRef: diff --git a/definitions/k8s-resource/clusterrolebindings.yaml b/definitions/k8s-resource/clusterrolebindings.yaml index d29384693e..2271a921c2 100644 --- a/definitions/k8s-resource/clusterrolebindings.yaml +++ b/definitions/k8s-resource/clusterrolebindings.yaml @@ -1,17 +1,4 @@ --- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: kyverno:policyviolations -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kyverno:policyviolations -subjects: -- kind: ServiceAccount - name: kyverno-service-account - namespace: kyverno ---- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: diff --git a/definitions/k8s-resource/clusterroles.yaml b/definitions/k8s-resource/clusterroles.yaml index 840ce9a2c0..3f4412dc82 100755 --- a/definitions/k8s-resource/clusterroles.yaml +++ b/definitions/k8s-resource/clusterroles.yaml @@ -26,16 +26,6 @@ metadata: --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole -metadata: - name: kyverno:policyviolations -rules: -- apiGroups: ["kyverno.io"] - resources: - - policyviolations - verbs: ["get", "list", "watch", "delete"] ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole metadata: name: kyverno:webhook rules: