From 59d0b3bae5f6017d9c051968c0d2d1552c707c26 Mon Sep 17 00:00:00 2001 From: Vincent Demeester Date: Mon, 29 Mar 2021 16:40:26 +0200 Subject: [PATCH] =?UTF-8?q?Use=20v1=20instead=20of=20v1beta1=20for=20`Clus?= =?UTF-8?q?terRoleBinding`=20=F0=9F=A4=96?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Starting in 1.17, using `ClusterRoleBinding` with rbac.authorization.k8s.io/v1beta1 is deprecated and will be removed in 1.22. Let's use `v1` API instead. Signed-off-by: Vincent Demeester --- config/201-clusterrolebinding.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/config/201-clusterrolebinding.yaml b/config/201-clusterrolebinding.yaml index f0b915c1e18..8008aafed41 100644 --- a/config/201-clusterrolebinding.yaml +++ b/config/201-clusterrolebinding.yaml @@ -12,7 +12,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: tekton-pipelines-controller-cluster-access @@ -33,7 +33,7 @@ roleRef: # then the ClusterRole would be namespaced. The access described by # the tekton-pipelines-controller-tenant-access ClusterRole would # be scoped to individual tenant namespaces. -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: tekton-pipelines-controller-tenant-access @@ -50,7 +50,7 @@ roleRef: name: tekton-pipelines-controller-tenant-access apiGroup: rbac.authorization.k8s.io --- -apiVersion: rbac.authorization.k8s.io/v1beta1 +apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: tekton-pipelines-webhook-cluster-access