diff --git a/groups/restrictions.yaml b/groups/restrictions.yaml index bf35fd31187..26e054d0416 100644 --- a/groups/restrictions.yaml +++ b/groups/restrictions.yaml @@ -53,7 +53,6 @@ restrictions: - "^k8s-infra-staging-csi-secrets-store@kubernetes.io$" - "^k8s-infra-staging-secrets-store-sync@kubernetes.io$" - "^k8s-infra-staging-multitenancy@kubernetes.io$" - - "^k8s-infra-staging-sig-auth@kubernetes.io$" - "^sig-auth@kubernetes.io$" - "^sig-auth-leads@kubernetes.io$" - path: "sig-autoscaling/groups.yaml" diff --git a/groups/sig-auth/groups.yaml b/groups/sig-auth/groups.yaml index 45ff26478ea..90565488723 100644 --- a/groups/sig-auth/groups.yaml +++ b/groups/sig-auth/groups.yaml @@ -1,5 +1,4 @@ groups: - # # Mailing lists # @@ -61,21 +60,6 @@ groups: MembersCanPostAsTheGroup: "false" ReconcileMembers: "false" - - email-id: k8s-infra-staging-sig-auth@kubernetes.io - name: k8s-infra-staging-sig-auth - description: |- - ACL for SIG-Auth owned container images that do not fall under one of the dedicated - sub-projects - settings: - ReconcileMembers: "true" - members: - - deads@redhat.com - - liggitt@google.com - - rita.z.zhang@gmail.com - - i@monis.app - - anish.ramasekar@gmail.com - - mhausler@amazon.com - - email-id: k8s-infra-staging-csi-secrets-store@kubernetes.io name: k8s-infra-staging-csi-secrets-store description: |- @@ -131,7 +115,6 @@ groups: # required for membership in these groups. # - # RBAC groups: # - grant access to the `namespace-user` role for a single namespace on the `aaa` cluster # - must have WhoCanViewMemberShip: "ALL_MEMBERS_CAN_VIEW" diff --git a/registry.k8s.io/images/k8s-staging-sig-auth/OWNERS b/registry.k8s.io/images/k8s-staging-sig-auth/OWNERS deleted file mode 100644 index 578175be507..00000000000 --- a/registry.k8s.io/images/k8s-staging-sig-auth/OWNERS +++ /dev/null @@ -1,9 +0,0 @@ -# See the OWNERS docs at https://go.k8s.io/owners - -approvers: -- sig-auth-leads -reviewers: -- sig-auth-leads - -labels: -- sig/auth diff --git a/registry.k8s.io/images/k8s-staging-sig-auth/images.yaml b/registry.k8s.io/images/k8s-staging-sig-auth/images.yaml deleted file mode 100644 index d7bc14cafc0..00000000000 --- a/registry.k8s.io/images/k8s-staging-sig-auth/images.yaml +++ /dev/null @@ -1,5 +0,0 @@ -- name: pod-security-webhook - dmap: - "sha256:818c11eaaf3863a9f1c9e8de9c310ac85b29cd89ebc54f832aa212bb52b5e7af": ["v1.22-alpha.0"] - "sha256:189012639ce8013d2e68705ffada4d446cb93de7649f20087201dad131461402": ["v1.23-beta.0"] - "sha256:f4e04e3deae59583dd25b8b6c00b85b98f7d334cd56fc641a5ecec15084afd79": ["v1.25.0"] diff --git a/registry.k8s.io/manifests/k8s-staging-sig-auth/promoter-manifest.yaml b/registry.k8s.io/manifests/k8s-staging-sig-auth/promoter-manifest.yaml deleted file mode 100644 index c0bc930b8d1..00000000000 --- a/registry.k8s.io/manifests/k8s-staging-sig-auth/promoter-manifest.yaml +++ /dev/null @@ -1,48 +0,0 @@ -# google group for gcr.io/k8s-staging-sig-auth k8s-infra-staging-sig-auth@kubernetes.io -registries: - - name: gcr.io/k8s-staging-sig-auth - src: true - - name: asia-east1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: asia-south1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: asia-northeast1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: asia-northeast2-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: australia-southeast1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-north1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-southwest1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west2-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west3-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west4-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west8-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west9-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: europe-west10-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: southamerica-west1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-central1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-east1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-east4-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-east5-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-south1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-west1-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com - - name: us-west2-docker.pkg.dev/k8s-artifacts-prod/images/sig-auth - service-account: k8s-infra-gcr-promoter@k8s-artifacts-prod.iam.gserviceaccount.com