diff --git a/manifest_staging/deploy/rbac-secretproviderrotation.yaml b/manifest_staging/deploy/rbac-secretproviderrotation.yaml deleted file mode 100644 index 24ecde822..000000000 --- a/manifest_staging/deploy/rbac-secretproviderrotation.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: secretproviderrotation-role -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: secretproviderrotation-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: secretproviderrotation-role -subjects: -- kind: ServiceAccount - name: secrets-store-csi-driver - namespace: kube-system diff --git a/manifest_staging/deploy/rbac-secretprovidertokenrequest.yaml b/manifest_staging/deploy/rbac-secretprovidertokenrequest.yaml deleted file mode 100644 index b97ff3d55..000000000 --- a/manifest_staging/deploy/rbac-secretprovidertokenrequest.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: secretprovidertokenrequest-role -rules: -- apiGroups: - - "" - resources: - - serviceaccounts/token - verbs: - - create ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: secretprovidertokenrequest-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: secretprovidertokenrequest-role -subjects: -- kind: ServiceAccount - name: secrets-store-csi-driver - namespace: kube-system