Skip to content

Commit

Permalink
chore: switch to rbac.authorization.k8s.io/v1
Browse files Browse the repository at this point in the history
https://kubernetes.io/docs/reference/using-api/deprecation-guide/#rbac-resources-v122

/v1beta1 is deprecated since v1.22 and v1 is available since v1.18
  • Loading branch information
Orzelius committed Jun 16, 2022
1 parent d4a7027 commit a3105c7
Show file tree
Hide file tree
Showing 2 changed files with 25 additions and 25 deletions.
42 changes: 21 additions & 21 deletions static/kubernetes/system/cert-manager/cert-manager-crd.yaml
Expand Up @@ -5402,7 +5402,7 @@ metadata:
helm.sh/chart: cert-manager-v0.11.0
---
# Source: cert-manager/charts/cainjector/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-cainjector
Expand Down Expand Up @@ -5432,7 +5432,7 @@ rules:
resources: ["customresourcedefinitions"]
verbs: ["get", "list", "watch", "update"]
---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-cainjector
Expand All @@ -5453,7 +5453,7 @@ subjects:

---
# leader election rules
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: cert-manager-cainjector:leaderelection
Expand All @@ -5475,7 +5475,7 @@ rules:

# grant cert-manager permission to manage the leaderelection configmap in the
# leader election namespace
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cert-manager-cainjector:leaderelection
Expand All @@ -5501,7 +5501,7 @@ subjects:
---
# apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-webhook:auth-delegator
Expand All @@ -5526,7 +5526,7 @@ subjects:
# apiserver gets the ability to read authentication. This allows it to
# read the specific configmap that has the requestheader-* entries to
# api agg
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cert-manager-webhook:webhook-authentication-reader
Expand Down Expand Up @@ -5571,7 +5571,7 @@ rules:
- create
---
# Source: cert-manager/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: cert-manager:leaderelection
Expand All @@ -5593,7 +5593,7 @@ rules:

# grant cert-manager permission to manage the leaderelection configmap in the
# leader election namespace
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cert-manager:leaderelection
Expand All @@ -5617,7 +5617,7 @@ subjects:
---

# Issuer controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-issuers
Expand All @@ -5644,7 +5644,7 @@ rules:
---

# ClusterIssuer controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-clusterissuers
Expand All @@ -5671,7 +5671,7 @@ rules:
---

# Certificates controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-certificates
Expand Down Expand Up @@ -5707,7 +5707,7 @@ rules:
---

# Orders controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-orders
Expand Down Expand Up @@ -5746,7 +5746,7 @@ rules:
---

# Challenges controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-challenges
Expand Down Expand Up @@ -5798,7 +5798,7 @@ rules:
---

# ingress-shim controller role
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cert-manager-controller-ingress-shim
Expand Down Expand Up @@ -5830,7 +5830,7 @@ rules:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-leaderelection
Expand All @@ -5851,7 +5851,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-issuers
Expand All @@ -5872,7 +5872,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-clusterissuers
Expand All @@ -5893,7 +5893,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-certificates
Expand All @@ -5914,7 +5914,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-orders
Expand All @@ -5935,7 +5935,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-challenges
Expand All @@ -5956,7 +5956,7 @@ subjects:

---

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cert-manager-controller-ingress-shim
Expand Down
8 changes: 4 additions & 4 deletions static/kubernetes/system/nginx-kind/nginx-kind-old.garden.yml
Expand Up @@ -70,7 +70,7 @@ manifests:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/part-of: ingress-nginx

- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: nginx-ingress-clusterrole
Expand Down Expand Up @@ -127,7 +127,7 @@ manifests:
verbs:
- update

- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: nginx-ingress-role
Expand Down Expand Up @@ -171,7 +171,7 @@ manifests:
verbs:
- get

- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: nginx-ingress-role-nisa-binding
Expand All @@ -188,7 +188,7 @@ manifests:
name: nginx-ingress-serviceaccount
namespace: ${var.namespace}

- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: nginx-ingress-clusterrole-nisa-binding
Expand Down

0 comments on commit a3105c7

Please sign in to comment.