Merge pull request #11 from leeeboo/master

change k8s api version.
This commit is contained in:
Hanfei Shen 2021-06-03 15:22:48 +08:00 committed by GitHub
commit 817d8e5488
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 7 additions and 7 deletions

View File

@ -1,4 +1,4 @@
apiVersion: apiregistration.k8s.io/v1beta1 apiVersion: apiregistration.k8s.io/v1
kind: APIService kind: APIService
metadata: metadata:
name: v1alpha1.{{ .Values.groupName }} name: v1alpha1.{{ .Values.groupName }}

View File

@ -11,7 +11,7 @@ metadata:
# Grant the webhook permission to read the ConfigMap containing the Kubernetes # Grant the webhook permission to read the ConfigMap containing the Kubernetes
# apiserver's requestheader-ca-certificate. # apiserver's requestheader-ca-certificate.
# This ConfigMap is automatically created by the Kubernetes apiserver. # This ConfigMap is automatically created by the Kubernetes apiserver.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader
@ -35,7 +35,7 @@ subjects:
# can remove this custom defined Role in favour of the system-provisioned # can remove this custom defined Role in favour of the system-provisioned
# extension-apiserver-authentication-reader Role resource in kube-system. # extension-apiserver-authentication-reader Role resource in kube-system.
# See https://github.com/kubernetes/kubernetes/issues/86359 for more details. # See https://github.com/kubernetes/kubernetes/issues/86359 for more details.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:webhook-authentication-reader
@ -54,7 +54,7 @@ rules:
--- ---
# apiserver gets the auth-delegator role to delegate auth decisions to # apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver # the core apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:auth-delegator name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:auth-delegator
@ -74,7 +74,7 @@ subjects:
namespace: {{ .Release.Namespace }} namespace: {{ .Release.Namespace }}
--- ---
# Grant cert-manager permission to validate using our apiserver # Grant cert-manager permission to validate using our apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver
@ -91,7 +91,7 @@ rules:
verbs: verbs:
- 'create' - 'create'
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:domain-solver
@ -130,7 +130,7 @@ rules:
- get - get
- watch - watch
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:secret-reader name: {{ include "cert-manager-webhook-dnspod.fullname" . }}:secret-reader