Skip to content

Commit c7ae9af

Browse files
committed
Delete k8s-infra-kops-ci-results GCS bucket
This bucket was never used so we are deleting it to avoid confusion
1 parent 0b23eb9 commit c7ae9af

File tree

1 file changed

+0
-54
lines changed

1 file changed

+0
-54
lines changed

infra/gcp/terraform/kubernetes-public/prowjob-buckets.tf

Lines changed: 0 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ This file defines all GCS buckets that prow jobs write to
1919
*/
2020

2121
locals {
22-
kops_ci_bucket_name = "k8s-infra-kops-ci-results" // Name of the bucket for kops ci jobs results (version markers, binaries, etc...)
2322
scalability_tests_logs_bucket_name = "k8s-infra-scalability-tests-logs" // Name of the bucket for the scalability test results
2423
scalability_golang_builds_bucket_name = "k8s-infra-scale-golang-builds" // Name of the bucket for the scalability golang builds
2524
}
@@ -138,56 +137,3 @@ resource "google_storage_bucket_iam_policy" "scalability_golang_builds_policy" {
138137
bucket = google_storage_bucket.scalability_golang_builds.name
139138
policy_data = data.google_iam_policy.scalability_golang_builds_bindings.policy_data
140139
}
141-
142-
// Bucket for kops CI jobs results
143-
resource "google_storage_bucket" "kops_ci_bucket" {
144-
project = data.google_project.project.project_id
145-
name = local.kops_ci_bucket_name
146-
location = "US"
147-
uniform_bucket_level_access = true
148-
}
149-
150-
data "google_iam_policy" "kops_ci_bucket_bindings" {
151-
// Ensure k8s-infra-kops-maintainers has admin privileges
152-
binding {
153-
members = [
154-
155-
]
156-
role = "roles/storage.admin"
157-
}
158-
// Maintain legacy admins privilegies
159-
binding {
160-
members = [
161-
162-
"projectEditor:${data.google_project.project.project_id}",
163-
"projectOwner:${data.google_project.project.project_id}",
164-
]
165-
role = "roles/storage.legacyBucketOwner"
166-
}
167-
binding {
168-
members = [
169-
"projectViewer:${data.google_project.project.project_id}",
170-
]
171-
role = "roles/storage.legacyBucketReader"
172-
}
173-
// Ensure prow-build serviceaccount can write to bucket
174-
binding {
175-
role = "roles/storage.objectAdmin"
176-
members = [
177-
"serviceAccount:[email protected]",
178-
]
179-
}
180-
// Ensure bucket is world readable
181-
binding {
182-
role = "roles/storage.objectViewer"
183-
members = [
184-
"allUsers"
185-
]
186-
}
187-
}
188-
189-
// Authoritative iam-policy: replaces any existing policy attached to the bucket
190-
resource "google_storage_bucket_iam_policy" "kops_ci_bucket_bindings" {
191-
bucket = google_storage_bucket.kops_ci_bucket.name
192-
policy_data = data.google_iam_policy.kops_ci_bucket_bindings.policy_data
193-
}

0 commit comments

Comments
 (0)