Merge pull request #1 from bacht-fidi/fix/remove-legacy-apiversions

Fix/remove legacy apiversions
This commit is contained in:
tristan-fidentity 2024-10-17 10:18:36 +02:00 committed by GitHub
commit f46d9ae31b
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
5 changed files with 12 additions and 15 deletions

View file

@ -1,8 +1,8 @@
apiVersion: v1
appVersion: "v0.1.4"
appVersion: "v0.1.5"
description: cert-manager webhook solver for ACME DNS01 challenge via DNSimple
name: cert-manager-webhook-dnsimple
version: 0.1.4
version: 0.1.5
home: https://github.com/puzzle/cert-manager-webhook-dnsimple
sources:
- https://github.com/puzzle/cert-manager-webhook-dnsimple

View file

@ -1,5 +1,4 @@
{{- $APIRegistrationAPIVersion := ternary "apiregistration.k8s.io/v1" "apiregistration.k8s.io/v1beta1" (.Capabilities.APIVersions.Has "apiregistration.k8s.io/v1") -}}
apiVersion: {{ $APIRegistrationAPIVersion }}
apiVersion: apiregistration.k8s.io/v1
kind: APIService
metadata:
name: v1alpha1.{{ include "dnsimple-webhook.api-group" . }}

View file

@ -1,8 +1,7 @@
{{- $CertManagerAPIVersion := ternary "cert-manager.io/v1" "cert-manager.io/v1alpha2" (.Capabilities.APIVersions.Has "cert-manager.io/v1") -}}
---
# Create a selfsigned Issuer, in order to create a root CA certificate for
# signing webhook serving certificates
apiVersion: {{ $CertManagerAPIVersion }}
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: {{ include "dnsimple-webhook.selfSignedIssuer" . }}
@ -18,7 +17,7 @@ spec:
---
# Generate a CA Certificate used to sign certificates for the webhook
apiVersion: {{ $CertManagerAPIVersion }}
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: {{ include "dnsimple-webhook.rootCACertificate" . }}
@ -39,7 +38,7 @@ spec:
---
# Create an Issuer that uses the above generated CA certificate to issue certs
apiVersion: {{ $CertManagerAPIVersion }}
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: {{ include "dnsimple-webhook.rootCAIssuer" . }}
@ -56,7 +55,7 @@ spec:
---
# Finally, generate a serving certificate for the webhook to use
apiVersion: {{ $CertManagerAPIVersion }}
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: {{ include "dnsimple-webhook.servingCertificate" . }}

View file

@ -1,4 +1,3 @@
{{- $RBACAPIVersion := ternary "rbac.authorization.k8s.io/v1" "rbac.authorization.k8s.io/v1beta1" (.Capabilities.APIVersions.Has "rbac.authorization.k8s.io/v1") -}}
apiVersion: v1
kind: ServiceAccount
metadata:
@ -12,7 +11,7 @@ metadata:
# Grant the webhook permission to read the ConfigMap containing the Kubernetes
# apiserver's requestheader-ca-certificate.
# This ConfigMap is automatically created by the Kubernetes apiserver.
apiVersion: {{ $RBACAPIVersion }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: {{ include "dnsimple-webhook.fullname" . }}:webhook-authentication-reader
@ -34,7 +33,7 @@ subjects:
---
# apiserver gets the auth-delegator role to delegate auth decisions to
# the core apiserver
apiVersion: {{ $RBACAPIVersion }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: {{ include "dnsimple-webhook.fullname" . }}:auth-delegator
@ -54,7 +53,7 @@ subjects:
namespace: {{ .Release.Namespace }}
---
# Grant cert-manager permission to validate using our apiserver
apiVersion: {{ $RBACAPIVersion }}
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: {{ include "dnsimple-webhook.fullname" . }}:domain-solver

View file

@ -20,7 +20,7 @@ clusterIssuer:
enabled: false
image:
repository: ghcr.io/puzzle/cert-manager-webhook-dnsimple
tag: v0.1.4
tag: v0.1.5
pullPolicy: IfNotPresent
# pullSecret: "gcr"
nameOverride: ""