Update helm template for deprecated APIs

Signed-off-by: Ricardo Pchevuzinske Katz <ricardo.katz@serpro.gov.br>
This commit is contained in:
Ricardo Pchevuzinske Katz 2020-06-19 18:02:28 -03:00
parent bcb3c751d8
commit 4100cd165e
4 changed files with 10 additions and 10 deletions

View File

@ -1,4 +1,4 @@
apiVersion: apiregistration.k8s.io/v1beta1
apiVersion: apiregistration.k8s.io/v1
kind: APIService
metadata:
name: v1alpha1.{{ .Values.groupName }}

View File

@ -1,4 +1,4 @@
apiVersion: apps/v1beta2
apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ include "example-webhook.fullname" . }}

View File

@ -1,7 +1,7 @@
---
# Create a selfsigned Issuer, in order to create a root CA certificate for
# signing webhook serving certificates
apiVersion: certmanager.k8s.io/v1alpha1
apiVersion: cert-manager.io/v1alpha3
kind: Issuer
metadata:
name: {{ include "example-webhook.selfSignedIssuer" . }}
@ -17,7 +17,7 @@ spec:
---
# Generate a CA Certificate used to sign certificates for the webhook
apiVersion: certmanager.k8s.io/v1alpha1
apiVersion: cert-manager.io/v1alpha3
kind: Certificate
metadata:
name: {{ include "example-webhook.rootCACertificate" . }}
@ -38,7 +38,7 @@ spec:
---
# Create an Issuer that uses the above generated CA certificate to issue certs
apiVersion: certmanager.k8s.io/v1alpha1
apiVersion: cert-manager.io/v1alpha3
kind: Issuer
metadata:
name: {{ include "example-webhook.rootCAIssuer" . }}
@ -55,7 +55,7 @@ spec:
---
# Finally, generate a serving certificate for the webhook to use
apiVersion: certmanager.k8s.io/v1alpha1
apiVersion: cert-manager.io/v1alpha3
kind: Certificate
metadata:
name: {{ include "example-webhook.servingCertificate" . }}

View File

@ -11,7 +11,7 @@ metadata:
# Grant the webhook permission to read the ConfigMap containing the Kubernetes
# apiserver's requestheader-ca-certificate.
# This ConfigMap is automatically created by the Kubernetes apiserver.
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:webhook-authentication-reader
@ -33,7 +33,7 @@ subjects:
---
# apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:auth-delegator
@ -53,7 +53,7 @@ subjects:
namespace: {{ .Release.Namespace }}
---
# Grant cert-manager permission to validate using our apiserver
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ include "example-webhook.fullname" . }}:domain-solver
@ -70,7 +70,7 @@ rules:
verbs:
- 'create'
---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "example-webhook.fullname" . }}:domain-solver