Skip to content

feat(helm): update chart cert-manager to v1.20.0#425

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/cert-manager-1.x
Open

feat(helm): update chart cert-manager to v1.20.0#425
renovate[bot] wants to merge 1 commit intomainfrom
renovate/cert-manager-1.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 14, 2026

This PR contains the following updates:

Package Update Change
cert-manager (source) minor v1.19.4v1.20.0

Release Notes

cert-manager/cert-manager (cert-manager)

v1.20.0

Compare Source


Configuration

📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link

--- HelmRelease: networking/cert-manager ClusterRole: networking/cert-manager-controller-ingress-shim

+++ HelmRelease: networking/cert-manager ClusterRole: networking/cert-manager-controller-ingress-shim

@@ -46,21 +46,23 @@

   - update
 - apiGroups:
   - gateway.networking.k8s.io
   resources:
   - gateways
   - httproutes
+  - listenersets
   verbs:
   - get
   - list
   - watch
 - apiGroups:
   - gateway.networking.k8s.io
   resources:
   - gateways/finalizers
   - httproutes/finalizers
+  - listenersets/finalizers
   verbs:
   - update
 - apiGroups:
   - ''
   resources:
   - events
--- HelmRelease: networking/cert-manager Deployment: networking/cert-manager-cainjector

+++ HelmRelease: networking/cert-manager Deployment: networking/cert-manager-cainjector

@@ -31,13 +31,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-cainjector
-        image: quay.io/jetstack/cert-manager-cainjector:v1.19.4
+        image: quay.io/jetstack/cert-manager-cainjector:v1.20.0
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --leader-election-namespace=kube-system
         ports:
         - containerPort: 9402
--- HelmRelease: networking/cert-manager Deployment: networking/cert-manager

+++ HelmRelease: networking/cert-manager Deployment: networking/cert-manager

@@ -31,19 +31,19 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-controller
-        image: quay.io/jetstack/cert-manager-controller:v1.19.4
+        image: quay.io/jetstack/cert-manager-controller:v1.20.0
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --cluster-resource-namespace=$(POD_NAMESPACE)
         - --leader-election-namespace=kube-system
-        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.4
+        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.20.0
         - --max-concurrent-challenges=60
         - --dns01-recursive-nameservers-only=true
         - --dns01-recursive-nameservers=https://1.1.1.1:443/dns-query,https://1.0.0.1:443/dns-query
         ports:
         - containerPort: 9402
           name: http-metrics
--- HelmRelease: networking/cert-manager Deployment: networking/cert-manager-webhook

+++ HelmRelease: networking/cert-manager Deployment: networking/cert-manager-webhook

@@ -31,13 +31,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-webhook
-        image: quay.io/jetstack/cert-manager-webhook:v1.19.4
+        image: quay.io/jetstack/cert-manager-webhook:v1.20.0
         imagePullPolicy: IfNotPresent
         args:
         - --v=2
         - --secure-port=10250
         - --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
         - --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
--- HelmRelease: networking/cert-manager ServiceMonitor: networking/cert-manager

+++ HelmRelease: networking/cert-manager ServiceMonitor: networking/cert-manager

@@ -9,13 +9,13 @@

     app.kubernetes.io/name: cert-manager
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/managed-by: Helm
     prometheus: default
 spec:
-  jobLabel: cert-manager
+  jobLabel: app.kubernetes.io/name
   selector:
     matchExpressions:
     - key: app.kubernetes.io/name
       operator: In
       values:
       - cainjector
--- HelmRelease: networking/cert-manager Job: networking/cert-manager-startupapicheck

+++ HelmRelease: networking/cert-manager Job: networking/cert-manager-startupapicheck

@@ -31,13 +31,13 @@

       securityContext:
         runAsNonRoot: true
         seccompProfile:
           type: RuntimeDefault
       containers:
       - name: cert-manager-startupapicheck
-        image: quay.io/jetstack/cert-manager-startupapicheck:v1.19.4
+        image: quay.io/jetstack/cert-manager-startupapicheck:v1.20.0
         imagePullPolicy: IfNotPresent
         args:
         - check
         - api
         - --wait=1m
         - -v

@github-actions
Copy link

--- kubernetes/apps/networking/cert-manager/app Kustomization: flux-system/cert-manager HelmRelease: networking/cert-manager

+++ kubernetes/apps/networking/cert-manager/app Kustomization: flux-system/cert-manager HelmRelease: networking/cert-manager

@@ -13,13 +13,13 @@

     spec:
       chart: cert-manager
       sourceRef:
         kind: HelmRepository
         name: jetstack
         namespace: flux-system
-      version: v1.19.4
+      version: v1.20.0
   install:
     remediation:
       retries: 3
   interval: 30m
   upgrade:
     cleanupOnFail: true

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants