Update API versions

Signed-off-by: Marcus Noble <github@marcusnoble.co.uk>
This commit is contained in:
Marcus Noble 2021-10-16 12:16:41 +01:00
parent 4a9589aaeb
commit 1b8318df3e
Signed by: AverageMarcus
GPG Key ID: B8F2DB8A7AEBAF78
3 changed files with 8 additions and 8 deletions

View File

@ -7,7 +7,7 @@ metadata:
labels: labels:
app.kubernetes.io/name: kube-state-metrics app.kubernetes.io/name: kube-state-metrics
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels: labels:
@ -149,7 +149,7 @@ rules:
- volumeattachments - volumeattachments
verbs: ["list", "watch"] verbs: ["list", "watch"]
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels: labels:

View File

@ -259,7 +259,7 @@ metadata:
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-controller-cluster-access name: tekton-pipelines-controller-cluster-access
@ -276,7 +276,7 @@ roleRef:
# then the ClusterRole would be namespaced. The access described by # then the ClusterRole would be namespaced. The access described by
# the tekton-pipelines-controller-tenant-access ClusterRole would # the tekton-pipelines-controller-tenant-access ClusterRole would
# be scoped to individual tenant namespaces. # be scoped to individual tenant namespaces.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-controller-tenant-access name: tekton-pipelines-controller-tenant-access
@ -289,7 +289,7 @@ roleRef:
name: tekton-pipelines-controller-tenant-access name: tekton-pipelines-controller-tenant-access
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-pipelines-webhook-cluster-access name: tekton-pipelines-webhook-cluster-access
@ -317,7 +317,7 @@ roleRef:
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-controller name: tekton-pipelines-controller
@ -331,7 +331,7 @@ roleRef:
name: tekton-pipelines-controller name: tekton-pipelines-controller
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io
--- ---
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
name: tekton-pipelines-webhook name: tekton-pipelines-webhook

View File

@ -128,7 +128,7 @@ metadata:
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
apiVersion: rbac.authorization.k8s.io/v1beta1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
name: tekton-triggers-controller-admin name: tekton-triggers-controller-admin