Skip to content

Commit

Permalink
Use v1 instead of v1beta1 for ClusterRoleBinding 🤖
Browse files Browse the repository at this point in the history
Starting in 1.17, using `ClusterRoleBinding` with
rbac.authorization.k8s.io/v1beta1 is deprecated and will be removed in
1.22. Let's use `v1` API instead.

Signed-off-by: Vincent Demeester <[email protected]>
  • Loading branch information
vdemeester authored and tekton-robot committed Mar 29, 2021
1 parent 46372f3 commit fd30912
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions config/201-clusterrolebinding.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
# See the License for the specific language governing permissions and
# limitations under the License.

apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: tekton-pipelines-controller-cluster-access
Expand All @@ -33,7 +33,7 @@ roleRef:
# then the ClusterRole would be namespaced. The access described by
# the tekton-pipelines-controller-tenant-access ClusterRole would
# be scoped to individual tenant namespaces.
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: tekton-pipelines-controller-tenant-access
Expand All @@ -50,7 +50,7 @@ roleRef:
name: tekton-pipelines-controller-tenant-access
apiGroup: rbac.authorization.k8s.io
---
apiVersion: rbac.authorization.k8s.io/v1beta1
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: tekton-pipelines-webhook-cluster-access
Expand Down

0 comments on commit fd30912

Please sign in to comment.