From a9f57e90a41fe835f71cde219e2bf41185eb28c4 Mon Sep 17 00:00:00 2001 From: Chen Rong Date: Tue, 22 Aug 2017 09:28:14 +0800 Subject: [PATCH] update to rbac v1 in bootstrappolicy test --- .../authorizer/rbac/bootstrappolicy/BUILD | 2 +- .../rbac/bootstrappolicy/policy_test.go | 6 +-- .../testdata/cluster-role-bindings.yaml | 16 +++---- .../testdata/cluster-roles.yaml | 38 ++++++++-------- .../testdata/controller-role-bindings.yaml | 44 +++++++++---------- .../testdata/controller-roles.yaml | 44 +++++++++---------- .../testdata/namespace-role-bindings.yaml | 12 ++--- .../testdata/namespace-roles.yaml | 14 +++--- 8 files changed, 88 insertions(+), 88 deletions(-) diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/BUILD b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/BUILD index b3243e18ff..501feb3066 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/BUILD +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/BUILD @@ -40,7 +40,7 @@ go_test( "//pkg/registry/rbac/validation:go_default_library", "//vendor/github.com/ghodss/yaml:go_default_library", "//vendor/k8s.io/api/core/v1:go_default_library", - "//vendor/k8s.io/api/rbac/v1beta1:go_default_library", + "//vendor/k8s.io/api/rbac/v1:go_default_library", "//vendor/k8s.io/apimachinery/pkg/api/meta:go_default_library", "//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library", "//vendor/k8s.io/apimachinery/pkg/util/diff:go_default_library", diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go index b9a6c2a0de..0435a23abc 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/policy_test.go @@ -26,7 +26,7 @@ import ( "github.com/ghodss/yaml" "k8s.io/api/core/v1" - rbacv1beta1 "k8s.io/api/rbac/v1beta1" + rbacv1 "k8s.io/api/rbac/v1" "k8s.io/apimachinery/pkg/api/meta" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/util/diff" @@ -280,11 +280,11 @@ func testObjects(t *testing.T, list *api.List, fixtureFilename string) { t.Fatal(err) } - if err := runtime.EncodeList(api.Codecs.LegacyCodec(v1.SchemeGroupVersion, rbacv1beta1.SchemeGroupVersion), list.Items); err != nil { + if err := runtime.EncodeList(api.Codecs.LegacyCodec(v1.SchemeGroupVersion, rbacv1.SchemeGroupVersion), list.Items); err != nil { t.Fatal(err) } - jsonData, err := runtime.Encode(api.Codecs.LegacyCodec(v1.SchemeGroupVersion, rbacv1beta1.SchemeGroupVersion), list) + jsonData, err := runtime.Encode(api.Codecs.LegacyCodec(v1.SchemeGroupVersion, rbacv1.SchemeGroupVersion), list) if err != nil { t.Fatal(err) } diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml index 87e8d85066..9688f9abd1 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-role-bindings.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -17,7 +17,7 @@ items: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:masters -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -37,7 +37,7 @@ items: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:unauthenticated -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -57,7 +57,7 @@ items: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:unauthenticated -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -74,7 +74,7 @@ items: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-controller-manager -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -91,7 +91,7 @@ items: - kind: ServiceAccount name: kube-dns namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -108,7 +108,7 @@ items: - apiGroup: rbac.authorization.k8s.io kind: User name: system:kube-scheduler -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -122,7 +122,7 @@ items: kind: ClusterRole name: system:node subjects: [] -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml index 309fab58f2..0f572371e2 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/cluster-roles.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -161,7 +161,7 @@ items: - patch - update - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -181,7 +181,7 @@ items: - '*' verbs: - '*' -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -322,7 +322,7 @@ items: - patch - update - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -344,7 +344,7 @@ items: - subjectaccessreviews verbs: - create -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -360,7 +360,7 @@ items: - selfsubjectaccessreviews verbs: - create -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -376,7 +376,7 @@ items: - certificatesigningrequests/nodeclient verbs: - create -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -392,7 +392,7 @@ items: - certificatesigningrequests/selfnodeclient verbs: - create -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -413,7 +413,7 @@ items: - /version verbs: - get -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -442,7 +442,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -461,7 +461,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -523,7 +523,7 @@ items: verbs: - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -541,7 +541,7 @@ items: verbs: - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -632,7 +632,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -751,7 +751,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -770,7 +770,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -800,7 +800,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -832,7 +832,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -883,7 +883,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml index eaa946c2cd..ddb59dbcef 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-role-bindings.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -17,7 +17,7 @@ items: - kind: ServiceAccount name: attachdetach-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -34,7 +34,7 @@ items: - kind: ServiceAccount name: certificate-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -51,7 +51,7 @@ items: - kind: ServiceAccount name: cronjob-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -68,7 +68,7 @@ items: - kind: ServiceAccount name: daemon-set-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -85,7 +85,7 @@ items: - kind: ServiceAccount name: deployment-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -102,7 +102,7 @@ items: - kind: ServiceAccount name: disruption-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -119,7 +119,7 @@ items: - kind: ServiceAccount name: endpoint-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -136,7 +136,7 @@ items: - kind: ServiceAccount name: generic-garbage-collector namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -153,7 +153,7 @@ items: - kind: ServiceAccount name: horizontal-pod-autoscaler namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -170,7 +170,7 @@ items: - kind: ServiceAccount name: job-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -187,7 +187,7 @@ items: - kind: ServiceAccount name: namespace-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -204,7 +204,7 @@ items: - kind: ServiceAccount name: node-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -221,7 +221,7 @@ items: - kind: ServiceAccount name: persistent-volume-binder namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -238,7 +238,7 @@ items: - kind: ServiceAccount name: pod-garbage-collector namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -255,7 +255,7 @@ items: - kind: ServiceAccount name: replicaset-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -272,7 +272,7 @@ items: - kind: ServiceAccount name: replication-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -289,7 +289,7 @@ items: - kind: ServiceAccount name: resourcequota-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -306,7 +306,7 @@ items: - kind: ServiceAccount name: route-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -323,7 +323,7 @@ items: - kind: ServiceAccount name: service-account-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -340,7 +340,7 @@ items: - kind: ServiceAccount name: service-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: @@ -357,7 +357,7 @@ items: - kind: ServiceAccount name: statefulset-controller namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: annotations: diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml index b85d951cd6..120b59ff76 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/controller-roles.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -48,7 +48,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -87,7 +87,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -139,7 +139,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -207,7 +207,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -263,7 +263,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -328,7 +328,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -371,7 +371,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -400,7 +400,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -479,7 +479,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -522,7 +522,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -557,7 +557,7 @@ items: - deletecollection - get - list -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -605,7 +605,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -701,7 +701,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -725,7 +725,7 @@ items: - nodes verbs: - list -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -768,7 +768,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -811,7 +811,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -842,7 +842,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -873,7 +873,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -897,7 +897,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -936,7 +936,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: @@ -1004,7 +1004,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml index ca79803cd9..f0e126d1e8 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-role-bindings.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: @@ -18,7 +18,7 @@ items: - kind: ServiceAccount name: bootstrap-signer namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: @@ -36,7 +36,7 @@ items: - kind: ServiceAccount name: kube-controller-manager namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: @@ -54,7 +54,7 @@ items: - kind: ServiceAccount name: kube-scheduler namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: @@ -72,7 +72,7 @@ items: - kind: ServiceAccount name: bootstrap-signer namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: @@ -90,7 +90,7 @@ items: - kind: ServiceAccount name: cloud-provider namespace: kube-system -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: annotations: diff --git a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-roles.yaml b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-roles.yaml index e8fa714cb0..efcc4bdbe1 100644 --- a/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-roles.yaml +++ b/plugin/pkg/auth/authorizer/rbac/bootstrappolicy/testdata/namespace-roles.yaml @@ -1,6 +1,6 @@ apiVersion: v1 items: -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -35,7 +35,7 @@ items: - create - patch - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -54,7 +54,7 @@ items: - configmaps verbs: - get -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -80,7 +80,7 @@ items: verbs: - get - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -106,7 +106,7 @@ items: verbs: - get - update -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -125,7 +125,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: @@ -145,7 +145,7 @@ items: - get - list - watch -- apiVersion: rbac.authorization.k8s.io/v1beta1 +- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: annotations: