From 6732c4110f32a76d0ab54ecba092b7a80f995f92 Mon Sep 17 00:00:00 2001 From: "xin.li" Date: Sun, 15 Oct 2023 18:46:29 +0800 Subject: [PATCH] kubeadm: fix uninvalid namespace field for clusterrole Signed-off-by: xin.li --- cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go b/cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go index 14a7b198483..a01cd3fbf17 100644 --- a/cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go +++ b/cmd/kubeadm/app/phases/bootstraptoken/node/tlsbootstrap.go @@ -55,8 +55,7 @@ func AllowBoostrapTokensToGetNodes(client clientset.Interface) error { if err := apiclient.CreateOrUpdateClusterRole(client, &rbac.ClusterRole{ ObjectMeta: metav1.ObjectMeta{ - Name: constants.GetNodesClusterRoleName, - Namespace: metav1.NamespaceSystem, + Name: constants.GetNodesClusterRoleName, }, Rules: []rbac.PolicyRule{ { @@ -71,8 +70,7 @@ func AllowBoostrapTokensToGetNodes(client clientset.Interface) error { return apiclient.CreateOrUpdateClusterRoleBinding(client, &rbac.ClusterRoleBinding{ ObjectMeta: metav1.ObjectMeta{ - Name: constants.GetNodesClusterRoleName, - Namespace: metav1.NamespaceSystem, + Name: constants.GetNodesClusterRoleName, }, RoleRef: rbac.RoleRef{ APIGroup: rbac.GroupName,