Skip to content

Commit 6571a76

Browse files
committed
Remove K8s RBAC
We do not need to use RBAC to read secrets. See #3607
1 parent 150c0bc commit 6571a76

File tree

4 files changed

+1
-26
lines changed

4 files changed

+1
-26
lines changed

infrastructure/tooling/src/dev/helm.js

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,6 @@ const resourceTypes = [
55
'cronjob',
66
'deployment',
77
'ingress',
8-
'rolebinding',
9-
'role',
108
'secret',
119
'serviceaccount',
1210
'service',

infrastructure/tooling/src/generate/generators/k8s.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ const renderTemplates = async (name, vars, procs, templates) => {
101101
await rimraf(TMPL_DIR);
102102
await mkdirp(TMPL_DIR);
103103

104-
for (const resource of ['role', 'rolebinding', 'serviceaccount', 'secret']) {
104+
for (const resource of ['serviceaccount', 'secret']) {
105105
const rendered = jsone(templates[resource], {
106106
projectName: `taskcluster-${name}`,
107107
labels: labels(`taskcluster-${name}`, 'secrets'),

infrastructure/tooling/templates/k8s/role.yaml

Lines changed: 0 additions & 9 deletions
This file was deleted.

infrastructure/tooling/templates/k8s/rolebinding.yaml

Lines changed: 0 additions & 14 deletions
This file was deleted.

0 commit comments

Comments
 (0)