mirror of
https://github.com/kyverno/kyverno.git
synced 2025-03-31 03:45:17 +00:00
remove clusterrole/binding kyverno:policyviolations
This commit is contained in:
parent
a9234d9c8b
commit
1d512d7068
6 changed files with 0 additions and 102 deletions
|
@ -1,16 +1,6 @@
|
||||||
{{- if .Values.rbac.create }}
|
{{- if .Values.rbac.create }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
|
||||||
name: {{ template "kyverno.fullname" . }}:policyviolations
|
|
||||||
rules:
|
|
||||||
- apiGroups: ["kyverno.io"]
|
|
||||||
resources:
|
|
||||||
- policyviolations
|
|
||||||
verbs: ["get", "list", "watch", "delete"]
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
metadata:
|
||||||
name: {{ template "kyverno.fullname" . }}:webhook
|
name: {{ template "kyverno.fullname" . }}:webhook
|
||||||
rules:
|
rules:
|
||||||
|
|
|
@ -1,17 +1,4 @@
|
||||||
{{- if .Values.rbac.create }}
|
{{- if .Values.rbac.create }}
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: {{ template "kyverno.fullname" . }}:policyviolations
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: {{ template "kyverno.fullname" . }}:policyviolations
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: {{ template "kyverno.serviceAccountName" . }}
|
|
||||||
namespace: {{ template "kyverno.namespace" . }}
|
|
||||||
---
|
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -2875,21 +2875,6 @@ rules:
|
||||||
verbs:
|
verbs:
|
||||||
- approve
|
- approve
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- kyverno.io
|
|
||||||
resources:
|
|
||||||
- policyviolations
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- delete
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -2931,19 +2916,6 @@ subjects:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: kyverno-service-account
|
|
||||||
namespace: kyverno
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
metadata:
|
||||||
name: kyverno:userinfo
|
name: kyverno:userinfo
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
|
@ -2875,21 +2875,6 @@ rules:
|
||||||
verbs:
|
verbs:
|
||||||
- approve
|
- approve
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- kyverno.io
|
|
||||||
resources:
|
|
||||||
- policyviolations
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- delete
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
@ -2931,19 +2916,6 @@ subjects:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: kyverno-service-account
|
|
||||||
namespace: kyverno
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
metadata:
|
||||||
name: kyverno:userinfo
|
name: kyverno:userinfo
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
|
@ -1,17 +1,4 @@
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: kyverno-service-account
|
|
||||||
namespace: kyverno
|
|
||||||
---
|
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
@ -26,16 +26,6 @@ metadata:
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
|
||||||
name: kyverno:policyviolations
|
|
||||||
rules:
|
|
||||||
- apiGroups: ["kyverno.io"]
|
|
||||||
resources:
|
|
||||||
- policyviolations
|
|
||||||
verbs: ["get", "list", "watch", "delete"]
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
metadata:
|
||||||
name: kyverno:webhook
|
name: kyverno:webhook
|
||||||
rules:
|
rules:
|
||||||
|
|
Loading…
Add table
Reference in a new issue