update rbac.authorization.k8s.io to non deprecated api-groups (#5517)

This commit is contained in:
Florian Ruynat 2020-04-14 22:14:04 +02:00 committed by GitHub
parent d316b02d28
commit b5125e59ab
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
40 changed files with 46 additions and 46 deletions

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kubernetes-dashboard name: kubernetes-dashboard

View File

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:netchecker-agent-hostnet name: psp:netchecker-agent-hostnet
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

View File

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:netchecker-agent-hostnet name: psp:netchecker-agent-hostnet
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

View File

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: netchecker-server name: netchecker-server
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

View File

@ -1,5 +1,5 @@
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: netchecker-server name: netchecker-server
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

View File

@ -5,7 +5,7 @@ metadata:
name: cloud-controller-manager name: cloud-controller-manager
namespace: kube-system namespace: kube-system
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: system:cloud-controller-manager name: system:cloud-controller-manager
@ -111,7 +111,7 @@ rules:
- patch - patch
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: oci-cloud-controller-manager name: oci-cloud-controller-manager
roleRef: roleRef:

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
annotations: annotations:

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: local-path-provisioner-bind name: local-path-provisioner-bind

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: local-path-provisioner-role name: local-path-provisioner-role

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-path-provisioner name: psp:local-path-provisioner
namespace: {{ local_path_provisioner_namespace }} namespace: {{ local_path_provisioner_namespace }}

View File

@ -1,6 +1,6 @@
--- ---
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-path-provisioner name: psp:local-path-provisioner
namespace: {{ local_path_provisioner_namespace }} namespace: {{ local_path_provisioner_namespace }}

View File

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

View File

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tiller name: tiller
namespace: {{ tiller_namespace }} namespace: {{ tiller_namespace }}

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: cert-manager name: cert-manager

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: cert-manager name: cert-manager

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: ingress-nginx name: ingress-nginx

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: ingress-nginx name: ingress-nginx

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: ingress-nginx name: ingress-nginx

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: ingress-nginx name: ingress-nginx

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico-kube-controllers name: calico-kube-controllers
namespace: kube-system namespace: kube-system

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico-kube-controllers name: calico-kube-controllers
roleRef: roleRef:

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: psp:registry name: psp:registry

View File

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:registry name: psp:registry
namespace: {{ registry_namespace }} namespace: {{ registry_namespace }}

View File

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: psp:registry-proxy name: psp:registry-proxy

View File

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:registry-proxy name: psp:registry-proxy
namespace: {{ registry_namespace }} namespace: {{ registry_namespace }}

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico name: calico
namespace: kube-system namespace: kube-system

View File

@ -1,7 +1,7 @@
--- ---
# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml # Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
rules: rules:

View File

@ -1,6 +1,6 @@
--- ---
# Bind the calico ClusterRole to the canal ServiceAccount. # Bind the calico ClusterRole to the canal ServiceAccount.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: canal-calico name: canal-calico

View File

@ -1,7 +1,7 @@
--- ---
# Bind the flannel ClusterRole to the canal ServiceAccount. # Bind the flannel ClusterRole to the canal ServiceAccount.
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: canal-flannel name: canal-flannel
roleRef: roleRef:

View File

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: contiv-netmaster name: contiv-netmaster
namespace: kube-system namespace: kube-system

View File

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: contiv-netmaster name: contiv-netmaster

View File

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: contiv-netplugin name: contiv-netplugin
namespace: kube-system namespace: kube-system

View File

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: contiv-netplugin name: contiv-netplugin

View File

@ -6,7 +6,7 @@ metadata:
namespace: "kube-system" namespace: "kube-system"
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
rules: rules:
@ -39,7 +39,7 @@ rules:
- use - use
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
roleRef: roleRef:

View File

@ -141,7 +141,7 @@ metadata:
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: kube-router name: kube-router
namespace: kube-system namespace: kube-system
@ -176,7 +176,7 @@ rules:
- watch - watch
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: kube-router name: kube-router
roleRef: roleRef:

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: multus name: multus
rules: rules:

View File

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: multus name: multus
roleRef: roleRef:

View File

@ -9,7 +9,7 @@ items:
labels: labels:
name: weave-net name: weave-net
namespace: kube-system namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1 - apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: weave-net name: weave-net
@ -49,7 +49,7 @@ items:
- podsecuritypolicies - podsecuritypolicies
verbs: verbs:
- use - use
- apiVersion: rbac.authorization.k8s.io/v1beta1 - apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: weave-net name: weave-net
@ -63,7 +63,7 @@ items:
- kind: ServiceAccount - kind: ServiceAccount
name: weave-net name: weave-net
namespace: kube-system namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1 - apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: weave-net name: weave-net
@ -86,7 +86,7 @@ items:
- configmaps - configmaps
verbs: verbs:
- create - create
- apiVersion: rbac.authorization.k8s.io/v1beta1 - apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: weave-net name: weave-net