Browse Source

update rbac.authorization.k8s.io to non deprecated api-groups (#5517)

pull/5517/merge
Florian Ruynat 4 years ago
committed by GitHub
parent
commit
b5125e59ab
No known key found for this signature in database GPG Key ID: 4AEE18F83AFDEB23
40 changed files with 46 additions and 46 deletions
  1. 2
      contrib/misc/clusteradmin-rbac.yml
  2. 2
      roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrole.yml.j2
  3. 2
      roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrolebinding.yml.j2
  4. 2
      roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrole.yml.j2
  5. 2
      roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrolebinding.yml.j2
  6. 4
      roles/kubernetes-apps/cluster_roles/files/oci-rbac.yml
  7. 2
      roles/kubernetes-apps/cluster_roles/templates/node-webhook-cr.yml.j2
  8. 2
      roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-clusterrolebinding.yml.j2
  9. 2
      roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-cr.yml.j2
  10. 2
      roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-cr.yml.j2
  11. 2
      roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-rb.yml.j2
  12. 2
      roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-cr.yml.j2
  13. 2
      roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-rb.yml.j2
  14. 2
      roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-role.yml.j2
  15. 2
      roles/kubernetes-apps/helm/templates/tiller-clusterrolebinding.yml.j2
  16. 2
      roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrole-cert-manager.yml.j2
  17. 2
      roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrolebinding-cert-manager.yml.j2
  18. 2
      roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrole-ingress-nginx.yml.j2
  19. 2
      roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrolebinding-ingress-nginx.yml.j2
  20. 2
      roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/role-ingress-nginx.yml.j2
  21. 2
      roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/rolebinding-ingress-nginx.yml.j2
  22. 2
      roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-cr.yml.j2
  23. 2
      roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-crb.yml.j2
  24. 2
      roles/kubernetes-apps/registry/templates/registry-cr.yml.j2
  25. 2
      roles/kubernetes-apps/registry/templates/registry-crb.yml.j2
  26. 2
      roles/kubernetes-apps/registry/templates/registry-proxy-cr.yml.j2
  27. 2
      roles/kubernetes-apps/registry/templates/registry-proxy-crb.yml.j2
  28. 2
      roles/network_plugin/canal/templates/canal-cr-calico.yml.j2
  29. 2
      roles/network_plugin/canal/templates/canal-cr-flannel.yml.j2
  30. 2
      roles/network_plugin/canal/templates/canal-crb-calico.yml.j2
  31. 2
      roles/network_plugin/canal/templates/canal-crb-flannel.yml.j2
  32. 2
      roles/network_plugin/contiv/templates/contiv-netmaster-clusterrole.yml.j2
  33. 2
      roles/network_plugin/contiv/templates/contiv-netmaster-clusterrolebinding.yml.j2
  34. 2
      roles/network_plugin/contiv/templates/contiv-netplugin-clusterrole.yml.j2
  35. 2
      roles/network_plugin/contiv/templates/contiv-netplugin-clusterrolebinding.yml.j2
  36. 4
      roles/network_plugin/flannel/templates/cni-flannel-rbac.yml.j2
  37. 4
      roles/network_plugin/kube-router/templates/kube-router.yml.j2
  38. 2
      roles/network_plugin/multus/files/multus-clusterrole.yml
  39. 2
      roles/network_plugin/multus/files/multus-clusterrolebinding.yml
  40. 8
      roles/network_plugin/weave/templates/weave-net.yml.j2

2
contrib/misc/clusteradmin-rbac.yml

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: kubernetes-dashboard name: kubernetes-dashboard

2
roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrole.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:netchecker-agent-hostnet name: psp:netchecker-agent-hostnet
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

2
roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-clusterrolebinding.yml.j2

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:netchecker-agent-hostnet name: psp:netchecker-agent-hostnet
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

2
roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrole.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: netchecker-server name: netchecker-server
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

2
roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrolebinding.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: netchecker-server name: netchecker-server
namespace: {{ netcheck_namespace }} namespace: {{ netcheck_namespace }}

4
roles/kubernetes-apps/cluster_roles/files/oci-rbac.yml

@ -5,7 +5,7 @@ metadata:
name: cloud-controller-manager name: cloud-controller-manager
namespace: kube-system namespace: kube-system
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: system:cloud-controller-manager name: system:cloud-controller-manager
@ -111,7 +111,7 @@ rules:
- patch - patch
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: oci-cloud-controller-manager name: oci-cloud-controller-manager
roleRef: roleRef:

2
roles/kubernetes-apps/cluster_roles/templates/node-webhook-cr.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
annotations: annotations:

2
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-clusterrolebinding.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: local-path-provisioner-bind name: local-path-provisioner-bind

2
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-cr.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: local-path-provisioner-role name: local-path-provisioner-role

2
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-cr.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-path-provisioner name: psp:local-path-provisioner
namespace: {{ local_path_provisioner_namespace }} namespace: {{ local_path_provisioner_namespace }}

2
roles/kubernetes-apps/external_provisioner/local_path_provisioner/templates/local-path-storage-psp-rb.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-path-provisioner name: psp:local-path-provisioner
namespace: {{ local_path_provisioner_namespace }} namespace: {{ local_path_provisioner_namespace }}

2
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-cr.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

2
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-rb.yml.j2

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

2
roles/kubernetes-apps/external_provisioner/local_volume_provisioner/templates/local-volume-provisioner-psp-role.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:local-volume-provisioner name: psp:local-volume-provisioner
namespace: {{ local_volume_provisioner_namespace }} namespace: {{ local_volume_provisioner_namespace }}

2
roles/kubernetes-apps/helm/templates/tiller-clusterrolebinding.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: tiller name: tiller
namespace: {{ tiller_namespace }} namespace: {{ tiller_namespace }}

2
roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrole-cert-manager.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: cert-manager name: cert-manager

2
roles/kubernetes-apps/ingress_controller/cert_manager/templates/clusterrolebinding-cert-manager.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: cert-manager name: cert-manager

2
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrole-ingress-nginx.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: ingress-nginx name: ingress-nginx

2
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/clusterrolebinding-ingress-nginx.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: ingress-nginx name: ingress-nginx

2
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/role-ingress-nginx.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: ingress-nginx name: ingress-nginx

2
roles/kubernetes-apps/ingress_controller/ingress_nginx/templates/rolebinding-ingress-nginx.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: ingress-nginx name: ingress-nginx

2
roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-cr.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico-kube-controllers name: calico-kube-controllers
namespace: kube-system namespace: kube-system

2
roles/kubernetes-apps/policy_controller/calico/templates/calico-kube-crb.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico-kube-controllers name: calico-kube-controllers
roleRef: roleRef:

2
roles/kubernetes-apps/registry/templates/registry-cr.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: psp:registry name: psp:registry

2
roles/kubernetes-apps/registry/templates/registry-crb.yml.j2

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:registry name: psp:registry
namespace: {{ registry_namespace }} namespace: {{ registry_namespace }}

2
roles/kubernetes-apps/registry/templates/registry-proxy-cr.yml.j2

@ -1,5 +1,5 @@
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: psp:registry-proxy name: psp:registry-proxy

2
roles/kubernetes-apps/registry/templates/registry-proxy-crb.yml.j2

@ -1,5 +1,5 @@
kind: RoleBinding kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: psp:registry-proxy name: psp:registry-proxy
namespace: {{ registry_namespace }} namespace: {{ registry_namespace }}

2
roles/network_plugin/canal/templates/canal-cr-calico.yml.j2

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: calico name: calico
namespace: kube-system namespace: kube-system

2
roles/network_plugin/canal/templates/canal-cr-flannel.yml.j2

@ -1,7 +1,7 @@
--- ---
# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml # Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
rules: rules:

2
roles/network_plugin/canal/templates/canal-crb-calico.yml.j2

@ -1,6 +1,6 @@
--- ---
# Bind the calico ClusterRole to the canal ServiceAccount. # Bind the calico ClusterRole to the canal ServiceAccount.
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: canal-calico name: canal-calico

2
roles/network_plugin/canal/templates/canal-crb-flannel.yml.j2

@ -1,7 +1,7 @@
--- ---
# Bind the flannel ClusterRole to the canal ServiceAccount. # Bind the flannel ClusterRole to the canal ServiceAccount.
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: canal-flannel name: canal-flannel
roleRef: roleRef:

2
roles/network_plugin/contiv/templates/contiv-netmaster-clusterrole.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: contiv-netmaster name: contiv-netmaster
namespace: kube-system namespace: kube-system

2
roles/network_plugin/contiv/templates/contiv-netmaster-clusterrolebinding.yml.j2

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: contiv-netmaster name: contiv-netmaster

2
roles/network_plugin/contiv/templates/contiv-netplugin-clusterrole.yml.j2

@ -1,5 +1,5 @@
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: contiv-netplugin name: contiv-netplugin
namespace: kube-system namespace: kube-system

2
roles/network_plugin/contiv/templates/contiv-netplugin-clusterrolebinding.yml.j2

@ -1,4 +1,4 @@
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: contiv-netplugin name: contiv-netplugin

4
roles/network_plugin/flannel/templates/cni-flannel-rbac.yml.j2

@ -6,7 +6,7 @@ metadata:
namespace: "kube-system" namespace: "kube-system"
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
rules: rules:
@ -39,7 +39,7 @@ rules:
- use - use
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: flannel name: flannel
roleRef: roleRef:

4
roles/network_plugin/kube-router/templates/kube-router.yml.j2

@ -141,7 +141,7 @@ metadata:
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: kube-router name: kube-router
namespace: kube-system namespace: kube-system
@ -176,7 +176,7 @@ rules:
- watch - watch
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: kube-router name: kube-router
roleRef: roleRef:

2
roles/network_plugin/multus/files/multus-clusterrole.yml

@ -1,6 +1,6 @@
--- ---
kind: ClusterRole kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: multus name: multus
rules: rules:

2
roles/network_plugin/multus/files/multus-clusterrolebinding.yml

@ -1,6 +1,6 @@
--- ---
kind: ClusterRoleBinding kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: multus name: multus
roleRef: roleRef:

8
roles/network_plugin/weave/templates/weave-net.yml.j2

@ -9,7 +9,7 @@ items:
labels: labels:
name: weave-net name: weave-net
namespace: kube-system namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: weave-net name: weave-net
@ -49,7 +49,7 @@ items:
- podsecuritypolicies - podsecuritypolicies
verbs: verbs:
- use - use
- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: weave-net name: weave-net
@ -63,7 +63,7 @@ items:
- kind: ServiceAccount - kind: ServiceAccount
name: weave-net name: weave-net
namespace: kube-system namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: Role kind: Role
metadata: metadata:
name: weave-net name: weave-net
@ -86,7 +86,7 @@ items:
- configmaps - configmaps
verbs: verbs:
- create - create
- apiVersion: rbac.authorization.k8s.io/v1beta1
- apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: weave-net name: weave-net

Loading…
Cancel
Save