diff --git a/docs/k8s-plugins/advanced/rbac-config.md b/docs/k8s-plugins/advanced/rbac-config.md index 4893ea92f3..3ae8869349 100644 --- a/docs/k8s-plugins/advanced/rbac-config.md +++ b/docs/k8s-plugins/advanced/rbac-config.md @@ -87,14 +87,6 @@ metadata: namespace: garden-system name: user--common rules: - # Allow port forward to build-sync services -- apiGroups: [""] - resources: ["pods"] - verbs: ["get", "list"] - # Note: An upcoming release will remove the requirement -- apiGroups: [""] - resources: ["pods/portforward"] - verbs: ["get", "list", "create"] # Allow storing and reading test results - apiGroups: [""] resources: ["configmaps"] @@ -114,9 +106,6 @@ rules: - apiGroups: ["rbac.authorization.k8s.io"] resources: ["roles", "rolebindings"] verbs: ["get", "list"] -- apiGroups: ["extensions", "apps"] - resources: ["deployments", "daemonsets"] - verbs: ["get", "list"] # Note: We do not store anything sensitive in secrets, aside from registry auth, # which users anyway need to be able to read and push built images. - apiGroups: [""] @@ -138,38 +127,3 @@ subjects: - namespace: kind: ServiceAccount name: user- - ---- - -# Allow building with kaniko in-cluster -# Note: An upcoming release will remove this required role -kind: Role -apiVersion: rbac.authorization.k8s.io/v1 -metadata: - namespace: garden-system - name: user--kaniko -rules: -- apiGroups: [""] - resources: ["pods"] - verbs: - - "get" - - "list" - - "create" - - "delete" - ---- - -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: user--kaniko - namespace: garden-system -roleRef: - kind: Role - name: user--kaniko - apiGroup: "" -subjects: -- namespace: - kind: ServiceAccount - name: user- -```