From 0f0e9297c3f30408bc9159a007f5bcb1f7f2408d Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Wed, 10 Dec 2025 15:02:35 +0000 Subject: [PATCH] chore: Update manifests after automerge --- .../ClusterIssuer-letsencrypt-issuer.yaml | 1 - .../ClusterRole-cert-manager-cainjector.yaml | 5 ++--- .../ClusterRole-cert-manager-cluster-view.yaml | 5 ++--- ...-manager-controller-approve:cert-manager-io.yaml | 5 ++--- ...erRole-cert-manager-controller-certificates.yaml | 5 ++--- ...nager-controller-certificatesigningrequests.yaml | 5 ++--- ...sterRole-cert-manager-controller-challenges.yaml | 5 ++--- ...Role-cert-manager-controller-clusterissuers.yaml | 5 ++--- ...erRole-cert-manager-controller-ingress-shim.yaml | 5 ++--- ...ClusterRole-cert-manager-controller-issuers.yaml | 5 ++--- .../ClusterRole-cert-manager-controller-orders.yaml | 5 ++--- .../cert-manager/ClusterRole-cert-manager-edit.yaml | 5 ++--- .../cert-manager/ClusterRole-cert-manager-view.yaml | 5 ++--- ...e-cert-manager-webhook:subjectaccessreviews.yaml | 5 ++--- .../ClusterRoleBinding-cert-manager-cainjector.yaml | 5 ++--- ...-manager-controller-approve:cert-manager-io.yaml | 5 ++--- ...inding-cert-manager-controller-certificates.yaml | 5 ++--- ...nager-controller-certificatesigningrequests.yaml | 5 ++--- ...eBinding-cert-manager-controller-challenges.yaml | 5 ++--- ...ding-cert-manager-controller-clusterissuers.yaml | 5 ++--- ...inding-cert-manager-controller-ingress-shim.yaml | 5 ++--- ...RoleBinding-cert-manager-controller-issuers.yaml | 5 ++--- ...rRoleBinding-cert-manager-controller-orders.yaml | 5 ++--- ...g-cert-manager-webhook:subjectaccessreviews.yaml | 5 ++--- ...inition-certificaterequests.cert-manager.io.yaml | 5 ++--- ...urceDefinition-certificates.cert-manager.io.yaml | 5 ++--- ...eDefinition-challenges.acme.cert-manager.io.yaml | 5 ++--- ...ceDefinition-clusterissuers.cert-manager.io.yaml | 5 ++--- ...mResourceDefinition-issuers.cert-manager.io.yaml | 5 ++--- ...ourceDefinition-orders.acme.cert-manager.io.yaml | 5 ++--- .../Deployment-cert-manager-cainjector.yaml | 11 +++++------ .../Deployment-cert-manager-webhook.yaml | 11 +++++------ .../cert-manager/Deployment-cert-manager.yaml | 13 ++++++------- .../ExternalSecret-cloudflare-api-token.yaml | 1 - .../Job-cert-manager-startupapicheck.yaml | 11 +++++------ ...ngWebhookConfiguration-cert-manager-webhook.yaml | 5 ++--- ...Role-cert-manager-cainjector:leaderelection.yaml | 5 ++--- ...le-cert-manager-startupapicheck:create-cert.yaml | 5 ++--- .../Role-cert-manager-tokenrequest.yaml | 5 ++--- .../Role-cert-manager-webhook:dynamic-serving.yaml | 5 ++--- .../Role-cert-manager:leaderelection.yaml | 5 ++--- ...ding-cert-manager-cainjector:leaderelection.yaml | 5 ++--- ...ng-cert-manager-startupapicheck:create-cert.yaml | 5 ++--- .../RoleBinding-cert-manager-tokenrequest.yaml | 5 ++--- ...inding-cert-manager-webhook:dynamic-serving.yaml | 5 ++--- .../RoleBinding-cert-manager:leaderelection.yaml | 5 ++--- .../Service-cert-manager-cainjector.yaml | 5 ++--- .../cert-manager/Service-cert-manager-webhook.yaml | 5 ++--- .../cert-manager/Service-cert-manager.yaml | 5 ++--- .../ServiceAccount-cert-manager-cainjector.yaml | 4 ++-- ...ServiceAccount-cert-manager-startupapicheck.yaml | 5 ++--- .../ServiceAccount-cert-manager-webhook.yaml | 5 ++--- .../cert-manager/ServiceAccount-cert-manager.yaml | 5 ++--- .../cert-manager/ServiceMonitor-cert-manager.yaml | 5 ++--- ...ngWebhookConfiguration-cert-manager-webhook.yaml | 5 ++--- 55 files changed, 119 insertions(+), 173 deletions(-) diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterIssuer-letsencrypt-issuer.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterIssuer-letsencrypt-issuer.yaml index 8ff45379b..a5d9a90b9 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterIssuer-letsencrypt-issuer.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterIssuer-letsencrypt-issuer.yaml @@ -1,4 +1,3 @@ ---- apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml index aa0937f61..e1efdb454 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml index 230c62a8d..851aa844b 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" rules: - apiGroups: ["cert-manager.io"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml index cc14cbf81..6e6e1ae43 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["signers"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml index 2bc22eb6c..e356bf674 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml index f4f359b0e..4ca830ce6 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["certificates.k8s.io"] resources: ["certificatesigningrequests"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml index 3278216e2..8755ef1d2 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["acme.cert-manager.io"] resources: ["challenges", "challenges/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml index 8cb1eed81..fcd66913f 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["clusterissuers", "clusterissuers/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml index 2a449ae92..f9a90ab29 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml index e51a9cd1c..3c90b28c2 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["cert-manager.io"] resources: ["issuers", "issuers/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml index 31b1ff58e..bfd49a03a 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["acme.cert-manager.io"] resources: ["orders", "orders/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml index e4d5ffaa4..ff2d7c75f 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" rules: diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml index 0f533f218..a17b54071 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml index 8805e2162..ddcb686b6 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["authorization.k8s.io"] resources: ["subjectaccessreviews"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml index d16628703..3c6f60afd 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml index 4d538b8a4..4685374e1 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml index 1cde44cba..4ca95d784 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml index 567ed4747..4565352bd 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml index 40a4405c8..efd604c36 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml index 9969e6ae2..fdfdd64c3 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml index 2cd72dfde..7799c134a 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml index 25907d43d..417b0de10 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml index 216353130..1bea0cd38 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml index 87c84ee55..8ae47f904 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml index 6c21d598a..e5c0a16e4 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml index 9b3879a7f..a09be734c 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml index 5c241847f..26f6fe7c4 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: acme.cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml index df4ada3a4..d74260c0f 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml index 5bc7cc07e..5e1986e73 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml index 8ca8a9252..361738e0e 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: @@ -10,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: group: acme.cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml index 0f50a400e..4343f81f7 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apps/v1 kind: Deployment metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: replicas: 2 selector: @@ -26,9 +25,9 @@ spec: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: serviceAccountName: cert-manager-cainjector enableServiceLinks: false @@ -38,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-cainjector - image: "quay.io/jetstack/cert-manager-cainjector:v1.19.1" + image: "quay.io/jetstack/cert-manager-cainjector:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml index 49b1e4a23..bf05aabf9 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apps/v1 kind: Deployment metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: replicas: 1 selector: @@ -26,9 +25,9 @@ spec: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: serviceAccountName: cert-manager-webhook enableServiceLinks: false @@ -38,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-webhook - image: "quay.io/jetstack/cert-manager-webhook:v1.19.1" + image: "quay.io/jetstack/cert-manager-webhook:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml index 58693cc88..166483d1f 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml @@ -1,4 +1,3 @@ ---- apiVersion: apps/v1 kind: Deployment metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: replicas: 2 selector: @@ -26,9 +25,9 @@ spec: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: serviceAccountName: cert-manager enableServiceLinks: false @@ -38,13 +37,13 @@ spec: type: RuntimeDefault containers: - name: cert-manager-controller - image: "quay.io/jetstack/cert-manager-controller:v1.19.1" + image: "quay.io/jetstack/cert-manager-controller:v1.19.2" imagePullPolicy: IfNotPresent args: - --v=2 - --cluster-resource-namespace=$(POD_NAMESPACE) - --leader-election-namespace=kube-system - - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.1 + - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.2 - --enable-gateway-api - --max-concurrent-challenges=60 ports: diff --git a/clusters/cl01tl/manifests/cert-manager/ExternalSecret-cloudflare-api-token.yaml b/clusters/cl01tl/manifests/cert-manager/ExternalSecret-cloudflare-api-token.yaml index 1012883f3..2eb6a70fd 100644 --- a/clusters/cl01tl/manifests/cert-manager/ExternalSecret-cloudflare-api-token.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ExternalSecret-cloudflare-api-token.yaml @@ -1,4 +1,3 @@ ---- apiVersion: external-secrets.io/v1 kind: ExternalSecret metadata: diff --git a/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml b/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml index f125ad9fa..262f78557 100644 --- a/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml @@ -1,4 +1,3 @@ ---- apiVersion: batch/v1 kind: Job metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded @@ -25,9 +24,9 @@ spec: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: restartPolicy: OnFailure serviceAccountName: cert-manager-startupapicheck @@ -38,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-startupapicheck - image: "quay.io/jetstack/cert-manager-startupapicheck:v1.19.1" + image: "quay.io/jetstack/cert-manager-startupapicheck:v1.19.2" imagePullPolicy: IfNotPresent args: - check diff --git a/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml index b30cadd67..270286ea9 100644 --- a/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml @@ -1,4 +1,3 @@ ---- apiVersion: admissionregistration.k8s.io/v1 kind: MutatingWebhookConfiguration metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml index 97bf20c2b..d6e3c51f2 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml index 9bdca4ba3..d1cd05322 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml index 1e9875148..672d6e4d7 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: [""] resources: ["serviceaccounts/token"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml index 6f3b0d7b0..ce4d6de1e 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml index 55835e3b4..493a959e8 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml index 9b7f8d279..25f92b565 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml index d1bb87102..d19be5a30 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml index 4fe8d7bc2..4685b5eff 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml index 568ea059b..79849bd83 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml index 907045f3c..4ef58f84d 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml @@ -1,4 +1,3 @@ ---- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml index 9c5059c55..a23d86d7c 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: Service metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml index 59059b6da..89e685463 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: Service metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml index 53fdb3522..677196ed7 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: Service metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml index 77bdb1209..66e3f02b2 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml @@ -9,6 +9,6 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml index f213bd9da..29827b03f 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true @@ -14,6 +13,6 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml index d92fd68b4..456fdd53f 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true @@ -10,6 +9,6 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml index fd832a458..e6f0e7006 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml @@ -1,4 +1,3 @@ ---- apiVersion: v1 kind: ServiceAccount automountServiceAccountToken: true @@ -10,6 +9,6 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml index 858f35782..e404214d1 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml @@ -1,4 +1,3 @@ ---- apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: @@ -9,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 prometheus: default spec: jobLabel: cert-manager diff --git a/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml index 4bc27d282..86d1639fe 100644 --- a/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml @@ -1,4 +1,3 @@ ---- apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: @@ -8,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.1" + app.kubernetes.io/version: "v1.19.2" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.1 + helm.sh/chart: cert-manager-v1.19.2 annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: