Skip to content

Commit

Permalink
Remove permissions required for reconciler.
Browse files Browse the repository at this point in the history
  • Loading branch information
dargudear-google committed Oct 24, 2024
1 parent f343fa4 commit 71c2fee
Show file tree
Hide file tree
Showing 8 changed files with 0 additions and 132 deletions.
2 changes: 0 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -403,9 +403,7 @@ e2e-provider-deploy:
e2e-deploy-manifest:
kubectl apply -f manifest_staging/deploy/csidriver.yaml
kubectl apply -f manifest_staging/deploy/rbac-secretproviderclass.yaml
kubectl apply -f manifest_staging/deploy/rbac-secretproviderrotation.yaml
kubectl apply -f manifest_staging/deploy/rbac-secretprovidersyncing.yaml
kubectl apply -f manifest_staging/deploy/rbac-secretprovidertokenrequest.yaml
kubectl apply -f manifest_staging/deploy/secrets-store.csi.x-k8s.io_secretproviderclasses.yaml
kubectl apply -f manifest_staging/deploy/secrets-store.csi.x-k8s.io_secretproviderclasspodstatuses.yaml
kubectl apply -f manifest_staging/deploy/role-secretproviderclasses-admin.yaml
Expand Down

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

26 changes: 0 additions & 26 deletions manifest_staging/deploy/rbac-secretproviderrotation.yaml

This file was deleted.

24 changes: 0 additions & 24 deletions manifest_staging/deploy/rbac-secretprovidertokenrequest.yaml

This file was deleted.

14 changes: 0 additions & 14 deletions test/bats/e2e-provider.bats
Original file line number Diff line number Diff line change
Expand Up @@ -83,29 +83,15 @@ export VALIDATE_TOKENS_AUDIENCE=$(get_token_requests_audience)
run kubectl get clusterrole/secretproviderclasspodstatuses-viewer-role
assert_success

run kubectl get clusterrole/secretproviderrotation-role
assert_success

run kubectl get clusterrole/secretprovidersyncing-role
assert_success

run kubectl get clusterrolebinding/secretproviderclasses-rolebinding
assert_success

run kubectl get clusterrolebinding/secretproviderrotation-rolebinding
assert_success

run kubectl get clusterrolebinding/secretprovidersyncing-rolebinding
assert_success

# validate token request role and rolebinding only when token requests are set
if [[ -n "${VALIDATE_TOKENS_AUDIENCE}" ]]; then
run kubectl get clusterrole/secretprovidertokenrequest-role
assert_success

run kubectl get clusterrolebinding/secretprovidertokenrequest-rolebinding
assert_success
fi
}

@test "[v1alpha1] deploy e2e-provider secretproviderclass crd" {
Expand Down

0 comments on commit 71c2fee

Please sign in to comment.