Browse Source
update rbac.authorization.k8s.io to non deprecated api-groups (#5517)
pull/5517/merge
Florian Ruynat
4 years ago
committed by
GitHub
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
40 changed files with
46 additions and
46 deletions
-
contrib/misc/clusteradmin-rbac.yml
-
roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrole.yml.j2
-
roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrolebinding.yml.j2
-
roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrole.yml.j2
-
roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrolebinding.yml.j2
-
roles/kubernetes-apps/cluster_roles/files/oci-rbac.yml
-
roles/kubernetes-apps/cluster_roles/templates/node-webhook-cr.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-clusterrolebinding.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-cr.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-cr.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-rb.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-cr.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-rb.yml.j2
-
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-role.yml.j2
-
roles/kubernetes-apps/helm/templates/tiller-clusterrolebinding.yml.j2
-
roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrole-cert-manager.yml.j2
-
roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrolebinding-cert-manager.yml.j2
-
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrole-ingress-nginx.yml.j2
-
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrolebinding-ingress-nginx.yml.j2
-
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/role-ingress-nginx.yml.j2
-
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/rolebinding-ingress-nginx.yml.j2
-
roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-cr.yml.j2
-
roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-crb.yml.j2
-
roles/kubernetes-apps/registry/templates/registry-cr.yml.j2
-
roles/kubernetes-apps/registry/templates/registry-crb.yml.j2
-
roles/kubernetes-apps/registry/templates/registry-proxy-cr.yml.j2
-
roles/kubernetes-apps/registry/templates/registry-proxy-crb.yml.j2
-
roles/network_plugin/canal/templates/canal-cr-calico.yml.j2
-
roles/network_plugin/canal/templates/canal-cr-flannel.yml.j2
-
roles/network_plugin/canal/templates/canal-crb-calico.yml.j2
-
roles/network_plugin/canal/templates/canal-crb-flannel.yml.j2
-
roles/network_plugin/contiv/templates/contiv-netmaster-clusterrole.yml.j2
-
roles/network_plugin/contiv/templates/contiv-netmaster-clusterrolebinding.yml.j2
-
roles/network_plugin/contiv/templates/contiv-netplugin-clusterrole.yml.j2
-
roles/network_plugin/contiv/templates/contiv-netplugin-clusterrolebinding.yml.j2
-
roles/network_plugin/flannel/templates/cni-flannel-rbac.yml.j2
-
roles/network_plugin/kube-router/templates/kube-router.yml.j2
-
roles/network_plugin/multus/files/multus-clusterrole.yml
-
roles/network_plugin/multus/files/multus-clusterrolebinding.yml
-
roles/network_plugin/weave/templates/weave-net.yml.j2
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: kubernetes-dashboard |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:netchecker-agent-hostnet |
|
|
|
namespace: {{ netcheck_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: RoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:netchecker-agent-hostnet |
|
|
|
namespace: {{ netcheck_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: netchecker-server |
|
|
|
namespace: {{ netcheck_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: netchecker-server |
|
|
|
namespace: {{ netcheck_namespace }} |
|
|
|
|
|
@ -5,7 +5,7 @@ metadata: |
|
|
|
name: cloud-controller-manager |
|
|
|
namespace: kube-system |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: system:cloud-controller-manager |
|
|
@ -111,7 +111,7 @@ rules: |
|
|
|
- patch |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: oci-cloud-controller-manager |
|
|
|
roleRef: |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
annotations: |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: local-path-provisioner-bind |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: local-path-provisioner-role |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:local-path-provisioner |
|
|
|
namespace: {{ local_path_provisioner_namespace }} |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: RoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:local-path-provisioner |
|
|
|
namespace: {{ local_path_provisioner_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:local-volume-provisioner |
|
|
|
namespace: {{ local_volume_provisioner_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: RoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:local-volume-provisioner |
|
|
|
namespace: {{ local_volume_provisioner_namespace }} |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:local-volume-provisioner |
|
|
|
namespace: {{ local_volume_provisioner_namespace }} |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: tiller |
|
|
|
namespace: {{ tiller_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: cert-manager |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: cert-manager |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: ingress-nginx |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: ingress-nginx |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: Role |
|
|
|
metadata: |
|
|
|
name: ingress-nginx |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: RoleBinding |
|
|
|
metadata: |
|
|
|
name: ingress-nginx |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: calico-kube-controllers |
|
|
|
namespace: kube-system |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: calico-kube-controllers |
|
|
|
roleRef: |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: psp:registry |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: RoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:registry |
|
|
|
namespace: {{ registry_namespace }} |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
--- |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: psp:registry-proxy |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: RoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: psp:registry-proxy |
|
|
|
namespace: {{ registry_namespace }} |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: calico |
|
|
|
namespace: kube-system |
|
|
|
|
|
@ -1,7 +1,7 @@ |
|
|
|
--- |
|
|
|
# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: flannel |
|
|
|
rules: |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
# Bind the calico ClusterRole to the canal ServiceAccount. |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: canal-calico |
|
|
|
|
|
@ -1,7 +1,7 @@ |
|
|
|
--- |
|
|
|
# Bind the flannel ClusterRole to the canal ServiceAccount. |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: canal-flannel |
|
|
|
roleRef: |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: contiv-netmaster |
|
|
|
namespace: kube-system |
|
|
|
|
|
@ -1,4 +1,4 @@ |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: contiv-netmaster |
|
|
|
|
|
@ -1,5 +1,5 @@ |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: contiv-netplugin |
|
|
|
namespace: kube-system |
|
|
|
|
|
@ -1,4 +1,4 @@ |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: contiv-netplugin |
|
|
|
|
|
@ -6,7 +6,7 @@ metadata: |
|
|
|
namespace: "kube-system" |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: flannel |
|
|
|
rules: |
|
|
@ -39,7 +39,7 @@ rules: |
|
|
|
- use |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: flannel |
|
|
|
roleRef: |
|
|
|
|
|
@ -141,7 +141,7 @@ metadata: |
|
|
|
|
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: kube-router |
|
|
|
namespace: kube-system |
|
|
@ -176,7 +176,7 @@ rules: |
|
|
|
- watch |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: kube-router |
|
|
|
roleRef: |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRole |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: multus |
|
|
|
rules: |
|
|
|
|
|
@ -1,6 +1,6 @@ |
|
|
|
--- |
|
|
|
kind: ClusterRoleBinding |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
metadata: |
|
|
|
name: multus |
|
|
|
roleRef: |
|
|
|
|
|
@ -9,7 +9,7 @@ items: |
|
|
|
labels: |
|
|
|
name: weave-net |
|
|
|
namespace: kube-system |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRole |
|
|
|
metadata: |
|
|
|
name: weave-net |
|
|
@ -49,7 +49,7 @@ items: |
|
|
|
- podsecuritypolicies |
|
|
|
verbs: |
|
|
|
- use |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: ClusterRoleBinding |
|
|
|
metadata: |
|
|
|
name: weave-net |
|
|
@ -63,7 +63,7 @@ items: |
|
|
|
- kind: ServiceAccount |
|
|
|
name: weave-net |
|
|
|
namespace: kube-system |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: Role |
|
|
|
metadata: |
|
|
|
name: weave-net |
|
|
@ -86,7 +86,7 @@ items: |
|
|
|
- configmaps |
|
|
|
verbs: |
|
|
|
- create |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1beta1 |
|
|
|
- apiVersion: rbac.authorization.k8s.io/v1 |
|
|
|
kind: RoleBinding |
|
|
|
metadata: |
|
|
|
name: weave-net |
|
|
|