diff --git a/cluster/addons/calico-policy-controller/podsecuritypolicies/calico-node-psp-binding.yaml b/cluster/addons/calico-policy-controller/podsecuritypolicies/calico-node-psp-binding.yaml deleted file mode 100644 index 74e2bef8a3c..00000000000 --- a/cluster/addons/calico-policy-controller/podsecuritypolicies/calico-node-psp-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: gce:podsecuritypolicy:calico - namespace: kube-system - labels: - addonmanager.kubernetes.io/mode: Reconcile -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: gce:podsecuritypolicy:privileged -subjects: -- kind: ServiceAccount - name: calico - namespace: kube-system diff --git a/cluster/addons/ip-masq-agent/podsecuritypolicies/ip-masq-agent-psp-binding.yaml b/cluster/addons/ip-masq-agent/podsecuritypolicies/ip-masq-agent-psp-binding.yaml deleted file mode 100644 index 95f056ef755..00000000000 --- a/cluster/addons/ip-masq-agent/podsecuritypolicies/ip-masq-agent-psp-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: gce:podsecuritypolicy:ip-masq-agent - namespace: kube-system - labels: - addonmanager.kubernetes.io/mode: Reconcile - kubernetes.io/cluster-service: "true" -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: gce:podsecuritypolicy:privileged -subjects: -- kind: ServiceAccount - name: ip-masq-agent - namespace: kube-system diff --git a/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-psp-binding.yaml b/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-psp-binding.yaml deleted file mode 100644 index 102b80771ff..00000000000 --- a/cluster/addons/metadata-agent/stackdriver/podsecuritypolicies/metadata-agent-psp-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: gce:podsecuritypolicy:metadata-agent - namespace: kube-system - labels: - addonmanager.kubernetes.io/mode: Reconcile - kubernetes.io/cluster-service: "true" -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: gce:podsecuritypolicy:privileged -subjects: - - kind: ServiceAccount - name: metadata-agent - namespace: kube-system diff --git a/cluster/addons/metadata-proxy/gce/podsecuritypolicies/metadata-proxy-psp-binding.yaml b/cluster/addons/metadata-proxy/gce/podsecuritypolicies/metadata-proxy-psp-binding.yaml deleted file mode 100644 index 86c5d06dbc9..00000000000 --- a/cluster/addons/metadata-proxy/gce/podsecuritypolicies/metadata-proxy-psp-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: gce:podsecuritypolicy:metadata-proxy - namespace: kube-system - labels: - addonmanager.kubernetes.io/mode: Reconcile - kubernetes.io/cluster-service: "true" -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: gce:podsecuritypolicy:privileged -subjects: -- kind: ServiceAccount - name: metadata-proxy - namespace: kube-system diff --git a/cluster/addons/node-problem-detector/podsecuritypolicies/npd-psp-binding.yaml b/cluster/addons/node-problem-detector/podsecuritypolicies/npd-psp-binding.yaml deleted file mode 100644 index e55a285032f..00000000000 --- a/cluster/addons/node-problem-detector/podsecuritypolicies/npd-psp-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: gce:podsecuritypolicy:npd - namespace: kube-system - labels: - addonmanager.kubernetes.io/mode: Reconcile - kubernetes.io/cluster-service: "true" -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: gce:podsecuritypolicy:privileged -subjects: -- kind: ServiceAccount - name: node-problem-detector - namespace: kube-system