From 47abd95a18e1d54e90ba12b917b14fb70f6e9c89 Mon Sep 17 00:00:00 2001 From: Albert Date: Thu, 3 Jun 2021 09:27:00 +0800 Subject: [PATCH] change k8s api version. --- .../templates/apiservice.yaml | 2 +- .../cert-manager-webhook-dnspod/templates/rbac.yaml | 12 ++++++------ 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/deploy/cert-manager-webhook-dnspod/templates/apiservice.yaml b/deploy/cert-manager-webhook-dnspod/templates/apiservice.yaml index 2e3502d..63e940e 100644 --- a/deploy/cert-manager-webhook-dnspod/templates/apiservice.yaml +++ b/deploy/cert-manager-webhook-dnspod/templates/apiservice.yaml @@ -1,4 +1,4 @@ -apiVersion: apiregistration.k8s.io/v1beta1 +apiVersion: apiregistration.k8s.io/v1 kind: APIService metadata: name: v1alpha1.{{ .Values.groupName }} diff --git a/deploy/cert-manager-webhook-dnspod/templates/rbac.yaml b/deploy/cert-manager-webhook-dnspod/templates/rbac.yaml index bc0de6f..4f517d4 100644 --- a/deploy/cert-manager-webhook-dnspod/templates/rbac.yaml +++ b/deploy/cert-manager-webhook-dnspod/templates/rbac.yaml @@ -11,7 +11,7 @@ metadata: # Grant the webhook permission to read the ConfigMap containing the Kubernetes # apiserver's requestheader-ca-certificate. # This ConfigMap is automatically created by the Kubernetes apiserver. -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader @@ -35,7 +35,7 @@ subjects: # can remove this custom defined Role in favour of the system-provisioned # extension-apiserver-authentication-reader Role resource in kube-system. # See https://github.com/kubernetes/kubernetes/issues/86359 for more details. -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader @@ -54,7 +54,7 @@ rules: --- # apiserver gets the auth-delegator role to delegate auth decisions to # the core apiserver -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:auth-delegator @@ -74,7 +74,7 @@ subjects: namespace: {{ .Release.Namespace }} --- # Grant cert-manager permission to validate using our apiserver -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver @@ -91,7 +91,7 @@ rules: verbs: - 'create' --- -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver @@ -130,7 +130,7 @@ rules: - get - watch --- -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:secret-reader