Skip to content

Commit

Permalink
update apiVersion for Kubernetes
Browse files Browse the repository at this point in the history
  • Loading branch information
qinhang3 committed Sep 15, 2020
1 parent 71bdc60 commit a9fe209
Showing 1 changed file with 14 additions and 14 deletions.
28 changes: 14 additions & 14 deletions deploy/bundle.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ metadata:
app: alidns-webhook

---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: alidns-webhook
Expand All @@ -24,7 +24,7 @@ rules:
- 'get'

---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: alidns-webhook
Expand All @@ -45,7 +45,7 @@ subjects:
# Grant the webhook permission to read the ConfigMap containing the Kubernetes
# apiserver's requestheader-ca-certificate.
# This ConfigMap is automatically created by the Kubernetes apiserver.
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: alidns-webhook:webhook-authentication-reader
Expand All @@ -64,7 +64,7 @@ subjects:
---
# apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: alidns-webhook:auth-delegator
Expand All @@ -82,7 +82,7 @@ subjects:
namespace: cert-manager
---
# Grant cert-manager permission to validate using our apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: alidns-webhook:domain-solver
Expand All @@ -96,7 +96,7 @@ rules:
verbs:
- 'create'
---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: alidns-webhook:domain-solver
Expand Down Expand Up @@ -133,15 +133,15 @@ spec:

---
# Source: alidns-webhook/templates/deployment.yaml
apiVersion: apps/v1beta2
apiVersion: apps/v1
kind: Deployment
metadata:
name: alidns-webhook
namespace: cert-manager
labels:
app: alidns-webhook
spec:
replicas:
replicas:
selector:
matchLabels:
app: alidns-webhook
Expand Down Expand Up @@ -181,14 +181,14 @@ spec:
readOnly: true
resources:
{}

volumes:
- name: certs
secret:
secretName: alidns-webhook-webhook-tls

---
apiVersion: apiregistration.k8s.io/v1beta1
apiVersion: apiregistration.k8s.io/v1
kind: APIService
metadata:
name: v1alpha1.acme.yourcompany.com
Expand All @@ -208,7 +208,7 @@ spec:
---
# Create a selfsigned Issuer, in order to create a root CA certificate for
# signing webhook serving certificates
apiVersion: cert-manager.io/v1alpha2
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: alidns-webhook-selfsign
Expand All @@ -221,7 +221,7 @@ spec:
---

# Generate a CA Certificate used to sign certificates for the webhook
apiVersion: cert-manager.io/v1alpha2
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: alidns-webhook-ca
Expand All @@ -239,7 +239,7 @@ spec:
---

# Create an Issuer that uses the above generated CA certificate to issue certs
apiVersion: cert-manager.io/v1alpha2
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: alidns-webhook-ca
Expand All @@ -253,7 +253,7 @@ spec:
---

# Finally, generate a serving certificate for the webhook to use
apiVersion: cert-manager.io/v1alpha2
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: alidns-webhook-webhook-tls
Expand Down

0 comments on commit a9fe209

Please sign in to comment.