From 370c3050d2c003db38bef2d0df6cae9309fbe434 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Tue, 24 Feb 2026 19:32:44 +0000 Subject: [PATCH] chore: Update manifests after automerge --- .../ClusterRole-cert-manager-cainjector.yaml | 4 ++-- .../ClusterRole-cert-manager-cluster-view.yaml | 4 ++-- ...t-manager-controller-approve:cert-manager-io.yaml | 4 ++-- ...terRole-cert-manager-controller-certificates.yaml | 4 ++-- ...anager-controller-certificatesigningrequests.yaml | 4 ++-- ...usterRole-cert-manager-controller-challenges.yaml | 4 ++-- ...rRole-cert-manager-controller-clusterissuers.yaml | 4 ++-- ...terRole-cert-manager-controller-ingress-shim.yaml | 4 ++-- .../ClusterRole-cert-manager-controller-issuers.yaml | 4 ++-- .../ClusterRole-cert-manager-controller-orders.yaml | 4 ++-- .../cert-manager/ClusterRole-cert-manager-edit.yaml | 4 ++-- .../cert-manager/ClusterRole-cert-manager-view.yaml | 4 ++-- ...le-cert-manager-webhook:subjectaccessreviews.yaml | 4 ++-- .../ClusterRoleBinding-cert-manager-cainjector.yaml | 4 ++-- ...t-manager-controller-approve:cert-manager-io.yaml | 4 ++-- ...Binding-cert-manager-controller-certificates.yaml | 4 ++-- ...anager-controller-certificatesigningrequests.yaml | 4 ++-- ...leBinding-cert-manager-controller-challenges.yaml | 4 ++-- ...nding-cert-manager-controller-clusterissuers.yaml | 4 ++-- ...Binding-cert-manager-controller-ingress-shim.yaml | 4 ++-- ...rRoleBinding-cert-manager-controller-issuers.yaml | 4 ++-- ...erRoleBinding-cert-manager-controller-orders.yaml | 4 ++-- ...ng-cert-manager-webhook:subjectaccessreviews.yaml | 4 ++-- ...finition-certificaterequests.cert-manager.io.yaml | 4 ++-- ...ourceDefinition-certificates.cert-manager.io.yaml | 4 ++-- ...ceDefinition-challenges.acme.cert-manager.io.yaml | 4 ++-- ...rceDefinition-clusterissuers.cert-manager.io.yaml | 4 ++-- ...omResourceDefinition-issuers.cert-manager.io.yaml | 4 ++-- ...sourceDefinition-orders.acme.cert-manager.io.yaml | 4 ++-- .../Deployment-cert-manager-cainjector.yaml | 10 +++++----- .../Deployment-cert-manager-webhook.yaml | 10 +++++----- .../cert-manager/Deployment-cert-manager.yaml | 12 ++++++------ .../Job-cert-manager-startupapicheck.yaml | 10 +++++----- ...ingWebhookConfiguration-cert-manager-webhook.yaml | 4 ++-- .../Role-cert-manager-cainjector:leaderelection.yaml | 4 ++-- ...ole-cert-manager-startupapicheck:create-cert.yaml | 4 ++-- .../cert-manager/Role-cert-manager-tokenrequest.yaml | 4 ++-- .../Role-cert-manager-webhook:dynamic-serving.yaml | 4 ++-- .../Role-cert-manager:leaderelection.yaml | 4 ++-- ...nding-cert-manager-cainjector:leaderelection.yaml | 4 ++-- ...ing-cert-manager-startupapicheck:create-cert.yaml | 4 ++-- .../RoleBinding-cert-manager-tokenrequest.yaml | 4 ++-- ...Binding-cert-manager-webhook:dynamic-serving.yaml | 4 ++-- .../RoleBinding-cert-manager:leaderelection.yaml | 4 ++-- .../Service-cert-manager-cainjector.yaml | 4 ++-- .../cert-manager/Service-cert-manager-webhook.yaml | 4 ++-- .../manifests/cert-manager/Service-cert-manager.yaml | 4 ++-- .../ServiceAccount-cert-manager-cainjector.yaml | 4 ++-- .../ServiceAccount-cert-manager-startupapicheck.yaml | 4 ++-- .../ServiceAccount-cert-manager-webhook.yaml | 4 ++-- .../cert-manager/ServiceAccount-cert-manager.yaml | 4 ++-- .../cert-manager/ServiceMonitor-cert-manager.yaml | 4 ++-- ...ingWebhookConfiguration-cert-manager-webhook.yaml | 4 ++-- 53 files changed, 119 insertions(+), 119 deletions(-) diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml index 359ccb9f8..ab883d9d0 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cainjector.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml index 21c3388bb..6f2109614 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-cluster-view.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true" rules: - apiGroups: ["cert-manager.io"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml index 05a966afe..85508dd33 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-approve:cert-manager-io.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["signers"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml index 0d6d2af6b..06e502ab1 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificates.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml index 4fbea9c3a..06ecfbc2a 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-certificatesigningrequests.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["certificates.k8s.io"] resources: ["certificatesigningrequests"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml index 5bbdc6642..d5fa2086b 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-challenges.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["acme.cert-manager.io"] resources: ["challenges", "challenges/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml index 54ca2538a..42fa7ee2c 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-clusterissuers.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["clusterissuers", "clusterissuers/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml index bdc350437..f8da8c575 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-ingress-shim.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["certificates", "certificaterequests"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml index 8dd3f953e..2429ec658 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-issuers.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["cert-manager.io"] resources: ["issuers", "issuers/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml index 47fd507b0..3d7c32495 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-controller-orders.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["acme.cert-manager.io"] resources: ["orders", "orders/status"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml index e5768fca7..5a999db8e 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-edit.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" rules: diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml index de82282ea..ed883c5fd 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-view.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml index 2ad9ac866..76e132560 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRole-cert-manager-webhook:subjectaccessreviews.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["authorization.k8s.io"] resources: ["subjectaccessreviews"] diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml index 92bea7da3..638401350 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-cainjector.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml index 3a56a1d84..219d678cd 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-approve:cert-manager-io.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml index e7960cdba..788eed6b3 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificates.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml index bf11dcb27..b666fd451 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-certificatesigningrequests.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cert-manager" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml index 8793966fd..94ab4a400 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-challenges.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml index c2e726154..871ad1c82 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-clusterissuers.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml index 0426c8cfc..5b1d4bee0 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-ingress-shim.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml index 12f277f16..f4d9b1828 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-issuers.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml index cc541ff61..28bbe49ff 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-controller-orders.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml index adc158bdc..4bd039ca3 100644 --- a/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ClusterRoleBinding-cert-manager-webhook:subjectaccessreviews.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml index 4f69825a0..4ee2364d7 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificaterequests.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml index c349405c8..ccb7b9d10 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-certificates.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml index 0a99b8c64..28fedae72 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-challenges.acme.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: acme.cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml index 9911d9d96..52997dbf2 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-clusterissuers.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml index 050485049..d21826c2a 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-issuers.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml index 7583734a1..f6d5716b4 100644 --- a/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml +++ b/clusters/cl01tl/manifests/cert-manager/CustomResourceDefinition-orders.acme.cert-manager.io.yaml @@ -9,9 +9,9 @@ metadata: app.kubernetes.io/name: "cert-manager" app.kubernetes.io/instance: "cert-manager" app.kubernetes.io/component: "crds" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: group: acme.cert-manager.io names: diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml index 88ae27ed6..5429b961f 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-cainjector.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: replicas: 2 selector: @@ -25,9 +25,9 @@ spec: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: serviceAccountName: cert-manager-cainjector enableServiceLinks: false @@ -37,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-cainjector - image: "quay.io/jetstack/cert-manager-cainjector:v1.19.3" + image: "quay.io/jetstack/cert-manager-cainjector:v1.19.4" imagePullPolicy: IfNotPresent args: - --v=2 diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml index a22a7e6f9..dc0609b46 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager-webhook.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: replicas: 1 selector: @@ -25,9 +25,9 @@ spec: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: serviceAccountName: cert-manager-webhook enableServiceLinks: false @@ -37,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-webhook - image: "quay.io/jetstack/cert-manager-webhook:v1.19.3" + image: "quay.io/jetstack/cert-manager-webhook:v1.19.4" imagePullPolicy: IfNotPresent args: - --v=2 diff --git a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml index 498432906..c1037bc5c 100644 --- a/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Deployment-cert-manager.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: replicas: 2 selector: @@ -25,9 +25,9 @@ spec: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: serviceAccountName: cert-manager enableServiceLinks: false @@ -37,13 +37,13 @@ spec: type: RuntimeDefault containers: - name: cert-manager-controller - image: "quay.io/jetstack/cert-manager-controller:v1.19.3" + image: "quay.io/jetstack/cert-manager-controller:v1.19.4" imagePullPolicy: IfNotPresent args: - --v=2 - --cluster-resource-namespace=$(POD_NAMESPACE) - --leader-election-namespace=kube-system - - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.3 + - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.4 - --enable-gateway-api - --max-concurrent-challenges=60 ports: diff --git a/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml b/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml index f5e4273e4..f1a23d62a 100644 --- a/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Job-cert-manager-startupapicheck.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded @@ -24,9 +24,9 @@ spec: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: restartPolicy: OnFailure serviceAccountName: cert-manager-startupapicheck @@ -37,7 +37,7 @@ spec: type: RuntimeDefault containers: - name: cert-manager-startupapicheck - image: "quay.io/jetstack/cert-manager-startupapicheck:v1.19.3" + image: "quay.io/jetstack/cert-manager-startupapicheck:v1.19.4" imagePullPolicy: IfNotPresent args: - check diff --git a/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml index e0cacdfa3..5595e4ada 100644 --- a/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/MutatingWebhookConfiguration-cert-manager-webhook.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml index 3a423d307..3bd616bd8 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-cainjector:leaderelection.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml index 00aaa2a26..eddb393a1 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-startupapicheck:create-cert.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml index 9d1078265..668ccf535 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-tokenrequest.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: [""] resources: ["serviceaccounts/token"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml index 7e5f3b967..6559dc415 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager-webhook:dynamic-serving.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: [""] resources: ["secrets"] diff --git a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml index 70640523f..59285c95b 100644 --- a/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Role-cert-manager:leaderelection.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml index 7b751fdce..b416278ec 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-cainjector:leaderelection.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml index 36fa9c6f7..bdc35900d 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-startupapicheck:create-cert.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 annotations: helm.sh/hook: post-install helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml index caf7761f2..0e06d0ea5 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-tokenrequest.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml index a35cfbf00..010c3e11e 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager-webhook:dynamic-serving.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml index 62b9bd008..363d04617 100644 --- a/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml +++ b/clusters/cl01tl/manifests/cert-manager/RoleBinding-cert-manager:leaderelection.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 roleRef: apiGroup: rbac.authorization.k8s.io kind: Role diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml index aa415eae6..7b898bc30 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-cainjector.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml index 447402a31..c01a9f910 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager-webhook.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml index c4bff07b8..973ba7dee 100644 --- a/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/Service-cert-manager.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 spec: type: ClusterIP ports: diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml index 4eae89ad5..1fdf30c30 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-cainjector.yaml @@ -9,6 +9,6 @@ metadata: app.kubernetes.io/name: cainjector app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "cainjector" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml index 60d24defc..861f7f853 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-startupapicheck.yaml @@ -13,6 +13,6 @@ metadata: app.kubernetes.io/name: startupapicheck app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "startupapicheck" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml index 0368b25ed..6064b2b02 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager-webhook.yaml @@ -9,6 +9,6 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml index 76ce91d97..fba0b52c7 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceAccount-cert-manager.yaml @@ -9,6 +9,6 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 diff --git a/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml b/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml index 17ce6573c..c9784845f 100644 --- a/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ServiceMonitor-cert-manager.yaml @@ -8,9 +8,9 @@ metadata: app.kubernetes.io/name: cert-manager app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "controller" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 prometheus: default spec: jobLabel: cert-manager diff --git a/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml b/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml index 0084e7579..fab5af883 100644 --- a/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml +++ b/clusters/cl01tl/manifests/cert-manager/ValidatingWebhookConfiguration-cert-manager-webhook.yaml @@ -7,9 +7,9 @@ metadata: app.kubernetes.io/name: webhook app.kubernetes.io/instance: cert-manager app.kubernetes.io/component: "webhook" - app.kubernetes.io/version: "v1.19.3" + app.kubernetes.io/version: "v1.19.4" app.kubernetes.io/managed-by: Helm - helm.sh/chart: cert-manager-v1.19.3 + helm.sh/chart: cert-manager-v1.19.4 annotations: cert-manager.io/inject-ca-from-secret: "cert-manager/cert-manager-webhook-ca" webhooks: -- 2.49.1