Skip to content

build(deps): update helm release cert-manager to v1.19.1#374

Merged
maxbrunet merged 2 commits intomainfrom
renovate/cert-manager-1.x
Nov 22, 2025
Merged

build(deps): update helm release cert-manager to v1.19.1#374
maxbrunet merged 2 commits intomainfrom
renovate/cert-manager-1.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jun 10, 2025

This PR contains the following updates:

Package Update Change
cert-manager (source) minor v1.17.2 -> v1.19.1

Release Notes

cert-manager/cert-manager (cert-manager)

v1.19.1

Compare Source

v1.19.0

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

⚠️ Known issues: We are working on a patch to fix the following issues:

This release focuses on expanding platform compatibility, improving deployment flexibility, enhancing observability, and addressing key reliability issues.

📖 Read the full release notes at cert-manager.io: https://cert-manager.io/docs/releases/release-notes/release-notes-1.19

Changes since v1.18.0:

Feature
  • Add IPv6 rules to the default network policy (#​7726, @​jcpunk)
  • Add global.nodeSelector to helm chart to allow for a single nodeSelector to be set across all services. (#​7818, @​StingRayZA)
  • Add a feature gate to default to Ingress pathType Exact in ACME HTTP01 Ingress challenge solvers. (#​7795, @​sspreitzer)
  • Add generated applyconfigurations allowing clients to make type-safe server-side apply requests for cert-manager resources. (#​7866, @​erikgb)
  • Added API defaults to issuer references group (cert-manager.io) and kind (Issuer). (#​7414, @​erikgb)
  • Added certmanager_certificate_challenge_status Prometheus metric. (#​7736, @​hjoshi123)
  • Added protocol field for rfc2136 DNS01 provider (#​7881, @​hjoshi123)
  • Added experimental field hostUsers flag to all pods. Not set by default. (#​7973, @​hjoshi123)
  • Support configurable resource requests and limits for ACME HTTP01 solver pods through ClusterIssuer and Issuer specifications, allowing granular resource management that overrides global --acme-http01-solver-resource-* settings. (#​7972, @​lunarwhite)
  • The CAInjectorMerging feature has been promoted to BETA and is now enabled by default (#​8017, @​ThatsMrTalbot)
  • The controller, webhook and ca-injector now log their version and git commit on startup for easier debugging and support. (#​8072, @​prasad89)
  • Updated certificate metrics to the collector approach. (#​7856, @​hjoshi123)
Bug or Regression
  • ACME: Increased challenge authorization timeout to 2 minutes to fix error waiting for authorization (#​7796, @​hjoshi123)
  • BUGFIX: permitted URI domains were incorrectly used to set the excluded URI domains in the CSR's name constraints (#​7816, @​kinolaev)
  • Enforced ACME HTTP-01 solver validation to properly reject configurations when multiple ingress options (class, ingressClassName, name) are specified simultaneously (#​8021, @​lunarwhite)
  • Increase maximum sizes of PEM certificates and chains which can be parsed in cert-manager, to handle leaf certificates with large numbers of DNS names or other identities (#​7961, @​SgtCoDFish)
  • Reverted adding the global.rbac.disableHTTPChallengesRole Helm option. (#​7836, @​inteon)
  • This change removes the path label of core ACME client metrics and will require users to update their monitoring dashboards and alerting rules if using those metrics. (#​8109, @​mladen-rusev-cyberark)
  • Use the latest version of ingress-nginx in E2E tests to ensure compatibility (#​7792, @​wallrj)
Other (Cleanup or Flake)
  • Helm: Fix naming template of tokenrequest RoleBinding resource to improve consistency (#​7761, @​lunarwhite)
  • Improve error messages when certificates, CRLs or private keys fail admission due to malformed or missing PEM data (#​7928, @​SgtCoDFish)
  • Major upgrade of Akamai SDK. NOTE: The new version has not been fully tested end-to-end due to the lack of cloud infrastructure. (#​8003, @​hjoshi123)
  • Update kind images to include the Kubernetes 1.33 node image (#​7786, @​wallrj)
  • Use maps.Copy for cleaner map handling (#​8092, @​quantpoet)
  • Vault: Migrate Vault E2E add-on tests from deprecated vault-client-go to the new vault/api client. (#​8059, @​armagankaratosun)

v1.18.3

Compare Source

v1.18.2

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the NameConstraints feature gate).
We dropped the new global.rbac.disableHTTPChallengesRole Helm option due to a bug we found, this feature will be released in v1.19 instead.

Changes since v1.18.1:

Bug or Regression

v1.18.1

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

We have added a new feature gate ACMEHTTP01IngressPathTypeExact, to allow ingress-nginx users to turn off the new default Ingress PathType: Exact behavior, in ACME HTTP01 Ingress challenge solvers.
This change fixes the following issue: #​7791

We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (error waiting for authorization), which has been reported by multiple users, since the release of cert-manager v1.16.0.
This change should fix the following issues: #​7337, #​7444, and #​7685.

ℹ️ Be sure to review all new features and changes below, and read the full release notes carefully before upgrading.

Changes since v1.18.0:

Feature
  • Added a new feature gate ACMEHTTP01IngressPathTypeExact, to allow ingress-nginx users to turn off the new default Ingress PathType: Exact behavior, in ACME HTTP01 Ingress challenge solvers. (#7810, @​sspreitzer)
Bug or Regression
  • ACME: Increased challenge authorization timeout to 2 minutes to fix error waiting for authorization. (#7801, @​hjoshi123)
Other (Cleanup or Flake)
  • Use the latest version of ingress-nginx in E2E tests to ensure compatibility (#7807, @​wallrj)

v1.18.0

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

cert-manager 1.18 introduces several new features and breaking changes. Highlights include support for ACME certificate profiles, a new default for Certificate.Spec.PrivateKey.RotationPolicy now set to Always (breaking change), and the default Certificate.Spec.RevisionHistoryLimit now set to 1 (potentially breaking).

ℹ️ Be sure to review all new features and changes below, and read the full release notes carefully before upgrading.

Known Issues
  • ACME HTTP01 challenge paths are rejected by the ingress-nginx validating webhook (#​7791)

Changes since v1.17.2:

Feature
  • Add config to the Vault issuer to allow the server-name to be specified when validating the certificates the Vault server presents. (#​7663, @​ThatsMrTalbot)
  • Added app.kubernetes.io/managed-by: cert-manager label to the created Let's Encrypt account keys (#​7577, @​terinjokes)
  • Added certificate issuance and expiration time metrics (certmanager_certificate_not_before_timestamp_seconds, certmanager_certificate_not_after_timestamp_seconds). (#​7612, @​solidDoWant)
  • Added ingress-shim option: --extra-certificate-annotations, which sets a list of annotation keys to be copied from Ingress-like to resulting Certificate object (#​7083, @​k0da)
  • Added the iss short name for the cert-manager Issuer resource. (#​7373, @​SgtCoDFish)
  • Added the ciss short name for the cert-manager ClusterIssuer resource (#​7373, @​SgtCoDFish)
  • Adds the global.rbac.disableHTTPChallengesRole helm value to disable HTTP-01 ACME challenges. This allows cert-manager to drop its permission to create pods, improving security when HTTP-01 challenges are not required. (#​7666, @​ali-hamza-noor)
  • Allow customizing signature algorithm (#​7591, @​tareksha)
  • Cache the full DNS response and handle TTL expiration in FindZoneByFqdn (#​7596, @​ThatsIvan)
  • Cert-manager now uses a local fork of the golang.org/x/crypto/acme package (#​7752, @​wallrj)
  • Add support for ACME profiles extension. (#​7777, @​wallrj)
  • Promote the UseDomainQualifiedFinalizer feature to GA. (#​7735, @​jsoref)
  • Switched service/servicemon definitions to use port names instead of numbers. (#​7727, @​jcpunk)
  • The default value of Certificate.Spec.PrivateKey.RotationPolicy changed from Never to Always. (#​7723, @​wallrj)
  • Potentially breaking: Set the default revisionHistoryLimit to 1 for the CertificateRequest revisions (#​7758, @​ali-hamza-noor)
Documentation
Bug or Regression
  • Bump go-jose dependency to address CVE-2025-27144. (#​7606, @​SgtCoDFish)
  • Bump golang.org/x/oauth2 to patch CVE-2025-22868. (#​7638, @​NicholasBlaskey)
  • Bump golang.org/x/crypto to patch GHSA-hcg3-q754-cr77. (#​7638, @​NicholasBlaskey)
  • Bump github.com/golang-jwt/jwt to patch GHSA-mh63-6h87-95cp. (#​7638, @​NicholasBlaskey)
  • Change of the Kubernetes Ingress pathType from ImplementationSpecific to Exact for a reliable handling of ingress controllers and enhanced security. (#​7767, @​sspreitzer)
  • Fix AWS Route53 error detection for not-found errors during deletion of DNS records. (#​7690, @​wallrj)
  • Fix behavior when running with --namespace=<namespace>: limit the scope of cert-manager to a single namespace and disable cluster-scoped controllers. (#​7678, @​tsaarni)
  • Fix handling of certificates with IP addresses in the commonName field; IP addresses are no longer added to the DNS subjectAlternativeName list and are instead added to the ipAddresses field as expected. (#​7081, @​johnjcool)
  • Fix issuing of certificates via DNS01 challenges on Cloudflare after a breaking change to the Cloudflare API (#​7549, @​LukeCarrier)
  • Fixed the certmanager_certificate_renewal_timestamp_seconds metric help text indicating that the metric is relative to expiration time, rather than Unix epoch time. (#​7609, @​solidDoWant)
  • Fixing the service account template to incorporate boolean values for the annotations. (#​7698, @​ali-hamza-noor)
  • Quote nodeSelector values in Helm Chart (#​7579, @​tobiasbp)
  • Skip Gateway TLS listeners in Passthrough mode. (#​6986, @​vehagn)
  • Upgrade golang.org/x/net fixing CVE-2025-22870. (#​7619, @​dependabot[bot])
Other (Cleanup or Flake)
  • ACME E2E Tests: Upgraded Pebble to v2.7.0 and modified the ACME tests to match latest Pebble behaviour. (#​7771, @​wallrj)
  • Patch the third_party/forked/acme package with support for the ACME profiles extension. (#​7776, @​wallrj)
  • Promote the AdditionalCertificateOutputFormats feature to GA, making additional formats always enabled. (#​7744, @​erikgb)
  • Remove deprecated feature gate ValidateCAA. Setting this feature gate is now a no-op which does nothing but print a warning log line (#​7553, @​SgtCoDFish)
  • Update kind images to include the Kubernetes 1.33 node image (#​7787, @​cert-manager-bot)
  • Upgrade Go to v1.24.4 (#​7785, @​wallrj)
  • Use slices.Contains to simplify code (#​7753, @​cuinix)

v1.17.4

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

We fixed a bug in the CSR's name constraints construction (only applies if you have enabled the NameConstraints feature gate).

Changes since v1.17.3:

Bug or Regression
  • BUGFIX: permitted URI domains were incorrectly used to set the excluded URI domains in the CSR's name constraints (#​7832, @​cert-manager-bot)

v1.17.3

Compare Source

cert-manager is the easiest way to automatically manage certificates in Kubernetes and OpenShift clusters.

This patch release addresses several vulnerabilities reported by the Trivy security scanner. It is built with the latest version of Go 1.23.

We have increased the ACME challenge authorization timeout to two minutes, which we hope will fix a timeout error (error waiting for authorization), which has been reported by multiple users, in: #​7337, #​7444, and #​7685.

ℹ️ Be sure to review all new features and changes below, and read the full release notes carefully before upgrading.

Changes since v1.17.2:

Bug or Regression
  • Bump Go to 1.23.10 to fix GO-2025-3749, GO-2025-3750, and GO-2025-3751 (#​7799, @​wallrj)
  • ACME: Increased challenge authorization timeout to 2 minutes to fix error waiting for authorization (#​7798, @​hjoshi123)
Other (Cleanup or Flake)
  • Use the latest version of ingress-nginx in E2E tests to ensure compatibility (#​7808, @​wallrj)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch 13 times, most recently from 1253c77 to 902d521 Compare June 17, 2025 17:03
@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch from 902d521 to 792dabc Compare June 18, 2025 06:47
@renovate renovate bot changed the title build(deps): update helm release cert-manager to v1.18.0 build(deps): update helm release cert-manager to v1.18.1 Jun 18, 2025
@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch 15 times, most recently from 33bd5c2 to 0c984ac Compare June 21, 2025 14:03
@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch 5 times, most recently from 2f7cd80 to 87de2a9 Compare June 26, 2025 06:00
@renovate renovate bot changed the title build(deps): update helm release cert-manager to v1.18.1 build(deps): update helm release cert-manager to v1.18.2 Jul 5, 2025
@renovate renovate bot force-pushed the renovate/cert-manager-1.x branch 21 times, most recently from 1e9b483 to 505145e Compare July 12, 2025 06:08
@maxbrunet
Copy link
Member

diff
===== /Service cert-manager/cert-manager ======
diff --git a/tmp/argocd-diff707544588/cert-manager-live.yaml b/tmp/argocd-diff707544588/cert-manager
index 20d013e5..59b433a8 100644
--- a/tmp/argocd-diff707544588/cert-manager-live.yaml
+++ b/tmp/argocd-diff707544588/cert-manager
@@ -2,15 +2,15 @@ apiVersion: v1
 kind: Service
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1
@@ -55,7 +55,7 @@ spec:
   - name: tcp-prometheus-servicemonitor
     port: 9402
     protocol: TCP
-    targetPort: 9402
+    targetPort: http-metrics
   selector:
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager

===== /Service cert-manager/cert-manager-cainjector ======
diff --git a/tmp/argocd-diff3936089784/cert-manager-cainjector-live.yaml b/tmp/argocd-diff3936089784/cert-manager-cainjector
index c19c9d61..e3dbf38a 100644
--- a/tmp/argocd-diff3936089784/cert-manager-cainjector-live.yaml
+++ b/tmp/argocd-diff3936089784/cert-manager-cainjector
@@ -2,15 +2,15 @@ apiVersion: v1
 kind: Service
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager-cainjector
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager-cainjector
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1

===== /Service cert-manager/cert-manager-webhook ======
diff --git a/tmp/argocd-diff3081134965/cert-manager-webhook-live.yaml b/tmp/argocd-diff3081134965/cert-manager-webhook
index 59c21a4b..d33a81a6 100644
--- a/tmp/argocd-diff3081134965/cert-manager-webhook-live.yaml
+++ b/tmp/argocd-diff3081134965/cert-manager-webhook
@@ -2,15 +2,15 @@ apiVersion: v1
 kind: Service
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager-webhook
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/Service:cert-manager/cert-manager-webhook
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1

===== /ServiceAccount cert-manager/cert-manager ======
diff --git a/tmp/argocd-diff3033706366/cert-manager-live.yaml b/tmp/argocd-diff3033706366/cert-manager
index 6f89978d..d49a349c 100644
--- a/tmp/argocd-diff3033706366/cert-manager-live.yaml
+++ b/tmp/argocd-diff3033706366/cert-manager
@@ -3,15 +3,15 @@ automountServiceAccountToken: true
 kind: ServiceAccount
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1

===== /ServiceAccount cert-manager/cert-manager-cainjector ======
diff --git a/tmp/argocd-diff2186353791/cert-manager-cainjector-live.yaml b/tmp/argocd-diff2186353791/cert-manager-cainjector
index 52b12e1f..4cdd3914 100644
--- a/tmp/argocd-diff2186353791/cert-manager-cainjector-live.yaml
+++ b/tmp/argocd-diff2186353791/cert-manager-cainjector
@@ -3,15 +3,15 @@ automountServiceAccountToken: true
 kind: ServiceAccount
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager-cainjector
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager-cainjector
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1

===== /ServiceAccount cert-manager/cert-manager-webhook ======
diff --git a/tmp/argocd-diff3853591192/cert-manager-webhook-live.yaml b/tmp/argocd-diff3853591192/cert-manager-webhook
index f2a8e880..6ece1216 100644
--- a/tmp/argocd-diff3853591192/cert-manager-webhook-live.yaml
+++ b/tmp/argocd-diff3853591192/cert-manager-webhook
@@ -3,15 +3,15 @@ automountServiceAccountToken: true
 kind: ServiceAccount
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager-webhook
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:/ServiceAccount:cert-manager/cert-manager-webhook
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: v1
     fieldsType: FieldsV1

===== admissionregistration.k8s.io/MutatingWebhookConfiguration /cert-manager-webhook ======
diff --git a/tmp/argocd-diff2179350324/cert-manager-webhook-live.yaml b/tmp/argocd-diff2179350324/cert-manager-webhook
index 82281d67..6938db14 100644
--- a/tmp/argocd-diff2179350324/cert-manager-webhook-live.yaml
+++ b/tmp/argocd-diff2179350324/cert-manager-webhook
@@ -2,7 +2,7 @@ apiVersion: admissionregistration.k8s.io/v1
 kind: MutatingWebhookConfiguration
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:admissionregistration.k8s.io/MutatingWebhookConfiguration:cert-manager/cert-manager-webhook
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:admissionregistration.k8s.io/MutatingWebhookConfiguration:cert-manager/cert-manager-webhook
     cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-ca
   generation: 6
   labels:
@@ -11,8 +11,8 @@ metadata:
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: admissionregistration.k8s.io/v1
     fieldsType: FieldsV1

===== admissionregistration.k8s.io/ValidatingWebhookConfiguration /cert-manager-webhook ======
diff --git a/tmp/argocd-diff2389738342/cert-manager-webhook-live.yaml b/tmp/argocd-diff2389738342/cert-manager-webhook
index 77e59548..1cab7b57 100644
--- a/tmp/argocd-diff2389738342/cert-manager-webhook-live.yaml
+++ b/tmp/argocd-diff2389738342/cert-manager-webhook
@@ -2,7 +2,7 @@ apiVersion: admissionregistration.k8s.io/v1
 kind: ValidatingWebhookConfiguration
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:admissionregistration.k8s.io/ValidatingWebhookConfiguration:cert-manager/cert-manager-webhook
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:admissionregistration.k8s.io/ValidatingWebhookConfiguration:cert-manager/cert-manager-webhook
     cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-ca
   generation: 7
   labels:
@@ -11,8 +11,8 @@ metadata:
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: admissionregistration.k8s.io/v1
     fieldsType: FieldsV1

===== apps/Deployment cert-manager/cert-manager ======
diff --git a/tmp/argocd-diff1285187855/cert-manager-live.yaml b/tmp/argocd-diff1285187855/cert-manager
index e75a0b1e..deb8e665 100644
--- a/tmp/argocd-diff1285187855/cert-manager-live.yaml
+++ b/tmp/argocd-diff1285187855/cert-manager
@@ -2,7 +2,7 @@ apiVersion: apps/v1
 kind: Deployment
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager
     deployment.kubernetes.io/revision: "19"
   generation: 19
   labels:
@@ -11,8 +11,8 @@ metadata:
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: apps/v1
     fieldsType: FieldsV1
@@ -178,15 +178,15 @@ spec:
         app.kubernetes.io/instance: cert-manager
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: cert-manager
-        app.kubernetes.io/version: v1.17.2
-        helm.sh/chart: cert-manager-v1.17.2
+        app.kubernetes.io/version: v1.19.1
+        helm.sh/chart: cert-manager-v1.19.1
     spec:
       containers:
       - args:
         - --v=2
         - --cluster-resource-namespace=$(POD_NAMESPACE)
         - --leader-election-namespace=kube-system
-        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.17.2
+        - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.19.1
         - --max-concurrent-challenges=60
         env:
         - name: POD_NAMESPACE
@@ -194,7 +194,7 @@ spec:
             fieldRef:
               apiVersion: v1
               fieldPath: metadata.namespace
-        image: quay.io/jetstack/cert-manager-controller:v1.17.2
+        image: quay.io/jetstack/cert-manager-controller:v1.19.1
         imagePullPolicy: IfNotPresent
         livenessProbe:
           failureThreshold: 8

===== apps/Deployment cert-manager/cert-manager-cainjector ======
diff --git a/tmp/argocd-diff2523401147/cert-manager-cainjector-live.yaml b/tmp/argocd-diff2523401147/cert-manager-cainjector
index 5e7ca221..ad58d574 100644
--- a/tmp/argocd-diff2523401147/cert-manager-cainjector-live.yaml
+++ b/tmp/argocd-diff2523401147/cert-manager-cainjector
@@ -2,7 +2,7 @@ apiVersion: apps/v1
 kind: Deployment
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager-cainjector
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager-cainjector
     deployment.kubernetes.io/revision: "19"
   generation: 19
   labels:
@@ -11,8 +11,8 @@ metadata:
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: apps/v1
     fieldsType: FieldsV1
@@ -164,8 +164,8 @@ spec:
         app.kubernetes.io/instance: cert-manager
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: cainjector
-        app.kubernetes.io/version: v1.17.2
-        helm.sh/chart: cert-manager-v1.17.2
+        app.kubernetes.io/version: v1.19.1
+        helm.sh/chart: cert-manager-v1.19.1
     spec:
       containers:
       - args:
@@ -177,7 +177,7 @@ spec:
             fieldRef:
               apiVersion: v1
               fieldPath: metadata.namespace
-        image: quay.io/jetstack/cert-manager-cainjector:v1.17.2
+        image: quay.io/jetstack/cert-manager-cainjector:v1.19.1
         imagePullPolicy: IfNotPresent
         name: cert-manager-cainjector
         ports:

===== apps/Deployment cert-manager/cert-manager-webhook ======
diff --git a/tmp/argocd-diff669189337/cert-manager-webhook-live.yaml b/tmp/argocd-diff669189337/cert-manager-webhook
index 0cf053a0..60619607 100644
--- a/tmp/argocd-diff669189337/cert-manager-webhook-live.yaml
+++ b/tmp/argocd-diff669189337/cert-manager-webhook
@@ -2,7 +2,7 @@ apiVersion: apps/v1
 kind: Deployment
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager-webhook
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:apps/Deployment:cert-manager/cert-manager-webhook
     deployment.kubernetes.io/revision: "17"
   generation: 17
   labels:
@@ -11,8 +11,8 @@ metadata:
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: apps/v1
     fieldsType: FieldsV1
@@ -194,8 +194,8 @@ spec:
         app.kubernetes.io/instance: cert-manager
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: webhook
-        app.kubernetes.io/version: v1.17.2
-        helm.sh/chart: cert-manager-v1.17.2
+        app.kubernetes.io/version: v1.19.1
+        helm.sh/chart: cert-manager-v1.19.1
     spec:
       containers:
       - args:
@@ -212,13 +212,13 @@ spec:
             fieldRef:
               apiVersion: v1
               fieldPath: metadata.namespace
-        image: quay.io/jetstack/cert-manager-webhook:v1.17.2
+        image: quay.io/jetstack/cert-manager-webhook:v1.19.1
         imagePullPolicy: IfNotPresent
         livenessProbe:
           failureThreshold: 3
           httpGet:
             path: /livez
-            port: 6080
+            port: healthcheck
             scheme: HTTP
           initialDelaySeconds: 60
           periodSeconds: 10
@@ -239,7 +239,7 @@ spec:
           failureThreshold: 3
           httpGet:
             path: /healthz
-            port: 6080
+            port: healthcheck
             scheme: HTTP
           initialDelaySeconds: 5
           periodSeconds: 5

===== cert-manager.io/ClusterIssuer /letsencrypt-prod ======
diff --git a/tmp/argocd-diff2330128051/letsencrypt-prod-live.yaml b/tmp/argocd-diff2330128051/letsencrypt-prod
index a59f3931..3d35d0af 100644
--- a/tmp/argocd-diff2330128051/letsencrypt-prod-live.yaml
+++ b/tmp/argocd-diff2330128051/letsencrypt-prod
@@ -2,7 +2,7 @@ apiVersion: cert-manager.io/v1
 kind: ClusterIssuer
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:cert-manager.io/ClusterIssuer:cert-manager/letsencrypt-prod
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:cert-manager.io/ClusterIssuer:cert-manager/letsencrypt-prod
   generation: 9
   managedFields:
   - apiVersion: cert-manager.io/v1

===== cilium.io/CiliumClusterwideNetworkPolicy /cert-manager-http01-solver ======
diff --git a/tmp/argocd-diff3105055300/cert-manager-http01-solver-live.yaml b/tmp/argocd-diff3105055300/cert-manager-http01-solver
index 367e6fc8..060fe069 100644
--- a/tmp/argocd-diff3105055300/cert-manager-http01-solver-live.yaml
+++ b/tmp/argocd-diff3105055300/cert-manager-http01-solver
@@ -2,7 +2,7 @@ apiVersion: cilium.io/v2
 kind: CiliumClusterwideNetworkPolicy
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:cilium.io/CiliumClusterwideNetworkPolicy:cert-manager/cert-manager-http01-solver
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:cilium.io/CiliumClusterwideNetworkPolicy:cert-manager/cert-manager-http01-solver
   generation: 1
   managedFields:
   - apiVersion: cilium.io/v2

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-cainjector ======
diff --git a/tmp/argocd-diff3845072068/cert-manager-cainjector-live.yaml b/tmp/argocd-diff3845072068/cert-manager-cainjector
index 067b27b6..85f36288 100644
--- a/tmp/argocd-diff3845072068/cert-manager-cainjector-live.yaml
+++ b/tmp/argocd-diff3845072068/cert-manager-cainjector
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-cainjector
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-cainjector
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-cluster-view ======
diff --git a/tmp/argocd-diff3112299261/cert-manager-cluster-view-live.yaml b/tmp/argocd-diff3112299261/cert-manager-cluster-view
index 0bd229ef..b732d8cf 100644
--- a/tmp/argocd-diff3112299261/cert-manager-cluster-view-live.yaml
+++ b/tmp/argocd-diff3112299261/cert-manager-cluster-view
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-cluster-view
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-cluster-view
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
     rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-approve:cert-manager-io ======
diff --git a/tmp/argocd-diff3301487099/cert-manager-controller-approve:cert-manager-io-live.yaml b/tmp/argocd-diff3301487099/cert-manager-controller-approve:cert-manager-io
index a0b6c28d..502e962a 100644
--- a/tmp/argocd-diff3301487099/cert-manager-controller-approve:cert-manager-io-live.yaml
+++ b/tmp/argocd-diff3301487099/cert-manager-controller-approve:cert-manager-io
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-approve:cert-manager-io
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-approve:cert-manager-io
   labels:
     app: cert-manager
     app.kubernetes.io/component: cert-manager
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-certificates ======
diff --git a/tmp/argocd-diff3643266543/cert-manager-controller-certificates-live.yaml b/tmp/argocd-diff3643266543/cert-manager-controller-certificates
index 2042f7ca..7f3fe1bd 100644
--- a/tmp/argocd-diff3643266543/cert-manager-controller-certificates-live.yaml
+++ b/tmp/argocd-diff3643266543/cert-manager-controller-certificates
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-certificates
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-certificates
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-certificatesigningrequests ======
diff --git a/tmp/argocd-diff3775992970/cert-manager-controller-certificatesigningrequests-live.yaml b/tmp/argocd-diff3775992970/cert-manager-controller-certificatesigningrequests
index cd43b1eb..df70043a 100644
--- a/tmp/argocd-diff3775992970/cert-manager-controller-certificatesigningrequests-live.yaml
+++ b/tmp/argocd-diff3775992970/cert-manager-controller-certificatesigningrequests
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-certificatesigningrequests
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-certificatesigningrequests
   labels:
     app: cert-manager
     app.kubernetes.io/component: cert-manager
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-challenges ======
diff --git a/tmp/argocd-diff1022051325/cert-manager-controller-challenges-live.yaml b/tmp/argocd-diff1022051325/cert-manager-controller-challenges
index 80bbb697..264adeca 100644
--- a/tmp/argocd-diff1022051325/cert-manager-controller-challenges-live.yaml
+++ b/tmp/argocd-diff1022051325/cert-manager-controller-challenges
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-challenges
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-challenges
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-clusterissuers ======
diff --git a/tmp/argocd-diff133373629/cert-manager-controller-clusterissuers-live.yaml b/tmp/argocd-diff133373629/cert-manager-controller-clusterissuers
index 2647908d..c055b3f7 100644
--- a/tmp/argocd-diff133373629/cert-manager-controller-clusterissuers-live.yaml
+++ b/tmp/argocd-diff133373629/cert-manager-controller-clusterissuers
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-clusterissuers
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-clusterissuers
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-ingress-shim ======
diff --git a/tmp/argocd-diff3463174652/cert-manager-controller-ingress-shim-live.yaml b/tmp/argocd-diff3463174652/cert-manager-controller-ingress-shim
index 759ac9b5..12efc41c 100644
--- a/tmp/argocd-diff3463174652/cert-manager-controller-ingress-shim-live.yaml
+++ b/tmp/argocd-diff3463174652/cert-manager-controller-ingress-shim
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-ingress-shim
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-ingress-shim
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-issuers ======
diff --git a/tmp/argocd-diff1603295862/cert-manager-controller-issuers-live.yaml b/tmp/argocd-diff1603295862/cert-manager-controller-issuers
index 035edda6..73c99fb6 100644
--- a/tmp/argocd-diff1603295862/cert-manager-controller-issuers-live.yaml
+++ b/tmp/argocd-diff1603295862/cert-manager-controller-issuers
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-issuers
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-issuers
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-controller-orders ======
diff --git a/tmp/argocd-diff2693380720/cert-manager-controller-orders-live.yaml b/tmp/argocd-diff2693380720/cert-manager-controller-orders
index 0bb9416b..0c1035c3 100644
--- a/tmp/argocd-diff2693380720/cert-manager-controller-orders-live.yaml
+++ b/tmp/argocd-diff2693380720/cert-manager-controller-orders
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-orders
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-controller-orders
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-edit ======
diff --git a/tmp/argocd-diff2178932313/cert-manager-edit-live.yaml b/tmp/argocd-diff2178932313/cert-manager-edit
index a56631ff..2c15d8fd 100644
--- a/tmp/argocd-diff2178932313/cert-manager-edit-live.yaml
+++ b/tmp/argocd-diff2178932313/cert-manager-edit
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-edit
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-edit
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
   managedFields:

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-view ======
diff --git a/tmp/argocd-diff2307436602/cert-manager-view-live.yaml b/tmp/argocd-diff2307436602/cert-manager-view
index d5bee71b..6c02cc4d 100644
--- a/tmp/argocd-diff2307436602/cert-manager-view-live.yaml
+++ b/tmp/argocd-diff2307436602/cert-manager-view
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-view
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-view
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
     rbac.authorization.k8s.io/aggregate-to-cluster-reader: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"

===== rbac.authorization.k8s.io/ClusterRole /cert-manager-webhook:subjectaccessreviews ======
diff --git a/tmp/argocd-diff4287543196/cert-manager-webhook:subjectaccessreviews-live.yaml b/tmp/argocd-diff4287543196/cert-manager-webhook:subjectaccessreviews
index ebafc621..76b8bc51 100644
--- a/tmp/argocd-diff4287543196/cert-manager-webhook:subjectaccessreviews-live.yaml
+++ b/tmp/argocd-diff4287543196/cert-manager-webhook:subjectaccessreviews
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-webhook:subjectaccessreviews
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRole:cert-manager/cert-manager-webhook:subjectaccessreviews
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-cainjector ======
diff --git a/tmp/argocd-diff3469270924/cert-manager-cainjector-live.yaml b/tmp/argocd-diff3469270924/cert-manager-cainjector
index 27332b39..c85c20fd 100644
--- a/tmp/argocd-diff3469270924/cert-manager-cainjector-live.yaml
+++ b/tmp/argocd-diff3469270924/cert-manager-cainjector
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-cainjector
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-cainjector
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-approve:cert-manager-io ======
diff --git a/tmp/argocd-diff3536886705/cert-manager-controller-approve:cert-manager-io-live.yaml b/tmp/argocd-diff3536886705/cert-manager-controller-approve:cert-manager-io
index 069bfea8..5ffc7c31 100644
--- a/tmp/argocd-diff3536886705/cert-manager-controller-approve:cert-manager-io-live.yaml
+++ b/tmp/argocd-diff3536886705/cert-manager-controller-approve:cert-manager-io
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-approve:cert-manager-io
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-approve:cert-manager-io
   labels:
     app: cert-manager
     app.kubernetes.io/component: cert-manager
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-certificates ======
diff --git a/tmp/argocd-diff3298444401/cert-manager-controller-certificates-live.yaml b/tmp/argocd-diff3298444401/cert-manager-controller-certificates
index fecd9344..43429263 100644
--- a/tmp/argocd-diff3298444401/cert-manager-controller-certificates-live.yaml
+++ b/tmp/argocd-diff3298444401/cert-manager-controller-certificates
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-certificates
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-certificates
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-certificatesigningrequests ======
diff --git a/tmp/argocd-diff3815609004/cert-manager-controller-certificatesigningrequests-live.yaml b/tmp/argocd-diff3815609004/cert-manager-controller-certificatesigningrequests
index f17fe13b..ffbc0edc 100644
--- a/tmp/argocd-diff3815609004/cert-manager-controller-certificatesigningrequests-live.yaml
+++ b/tmp/argocd-diff3815609004/cert-manager-controller-certificatesigningrequests
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-certificatesigningrequests
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-certificatesigningrequests
   labels:
     app: cert-manager
     app.kubernetes.io/component: cert-manager
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-challenges ======
diff --git a/tmp/argocd-diff3551427450/cert-manager-controller-challenges-live.yaml b/tmp/argocd-diff3551427450/cert-manager-controller-challenges
index 5bdacb7d..3b07f65c 100644
--- a/tmp/argocd-diff3551427450/cert-manager-controller-challenges-live.yaml
+++ b/tmp/argocd-diff3551427450/cert-manager-controller-challenges
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-challenges
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-challenges
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-clusterissuers ======
diff --git a/tmp/argocd-diff1103095267/cert-manager-controller-clusterissuers-live.yaml b/tmp/argocd-diff1103095267/cert-manager-controller-clusterissuers
index c83e57d7..1feff618 100644
--- a/tmp/argocd-diff1103095267/cert-manager-controller-clusterissuers-live.yaml
+++ b/tmp/argocd-diff1103095267/cert-manager-controller-clusterissuers
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-clusterissuers
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-clusterissuers
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-ingress-shim ======
diff --git a/tmp/argocd-diff1305424783/cert-manager-controller-ingress-shim-live.yaml b/tmp/argocd-diff1305424783/cert-manager-controller-ingress-shim
index c895843f..5f82d7fd 100644
--- a/tmp/argocd-diff1305424783/cert-manager-controller-ingress-shim-live.yaml
+++ b/tmp/argocd-diff1305424783/cert-manager-controller-ingress-shim
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-ingress-shim
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-ingress-shim
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-issuers ======
diff --git a/tmp/argocd-diff71872931/cert-manager-controller-issuers-live.yaml b/tmp/argocd-diff71872931/cert-manager-controller-issuers
index 5f0cab75..509eca12 100644
--- a/tmp/argocd-diff71872931/cert-manager-controller-issuers-live.yaml
+++ b/tmp/argocd-diff71872931/cert-manager-controller-issuers
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-issuers
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-issuers
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-controller-orders ======
diff --git a/tmp/argocd-diff1856738999/cert-manager-controller-orders-live.yaml b/tmp/argocd-diff1856738999/cert-manager-controller-orders
index 249d53da..2a70037d 100644
--- a/tmp/argocd-diff1856738999/cert-manager-controller-orders-live.yaml
+++ b/tmp/argocd-diff1856738999/cert-manager-controller-orders
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-orders
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-controller-orders
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/ClusterRoleBinding /cert-manager-webhook:subjectaccessreviews ======
diff --git a/tmp/argocd-diff4007359071/cert-manager-webhook:subjectaccessreviews-live.yaml b/tmp/argocd-diff4007359071/cert-manager-webhook:subjectaccessreviews
index 5186a376..b3fa382d 100644
--- a/tmp/argocd-diff4007359071/cert-manager-webhook:subjectaccessreviews-live.yaml
+++ b/tmp/argocd-diff4007359071/cert-manager-webhook:subjectaccessreviews
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-webhook:subjectaccessreviews
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/cert-manager-webhook:subjectaccessreviews
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/Role cert-manager/cert-manager-tokenrequest ======
diff --git a/tmp/argocd-diff3318024981/cert-manager-tokenrequest-live.yaml b/tmp/argocd-diff3318024981/cert-manager-tokenrequest
index 235bfa14..e7f2a6e3 100644
--- a/tmp/argocd-diff3318024981/cert-manager-tokenrequest-live.yaml
+++ b/tmp/argocd-diff3318024981/cert-manager-tokenrequest
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:cert-manager/cert-manager-tokenrequest
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:cert-manager/cert-manager-tokenrequest
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/Role cert-manager/cert-manager-webhook:dynamic-serving ======
diff --git a/tmp/argocd-diff709544455/cert-manager-webhook:dynamic-serving-live.yaml b/tmp/argocd-diff709544455/cert-manager-webhook:dynamic-serving
index 65dbc953..56e7bd5f 100644
--- a/tmp/argocd-diff709544455/cert-manager-webhook:dynamic-serving-live.yaml
+++ b/tmp/argocd-diff709544455/cert-manager-webhook:dynamic-serving
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:cert-manager/cert-manager-webhook:dynamic-serving
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:cert-manager/cert-manager-webhook:dynamic-serving
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/Role kube-system/cert-manager-cainjector:leaderelection ======
diff --git a/tmp/argocd-diff2756446609/cert-manager-cainjector:leaderelection-live.yaml b/tmp/argocd-diff2756446609/cert-manager-cainjector:leaderelection
index 7c39ae4a..ad4ae41f 100644
--- a/tmp/argocd-diff2756446609/cert-manager-cainjector:leaderelection-live.yaml
+++ b/tmp/argocd-diff2756446609/cert-manager-cainjector:leaderelection
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:kube-system/cert-manager-cainjector:leaderelection
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:kube-system/cert-manager-cainjector:leaderelection
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/Role kube-system/cert-manager:leaderelection ======
diff --git a/tmp/argocd-diff2774063264/cert-manager:leaderelection-live.yaml b/tmp/argocd-diff2774063264/cert-manager:leaderelection
index 02b6cf98..9a7ec51e 100644
--- a/tmp/argocd-diff2774063264/cert-manager:leaderelection-live.yaml
+++ b/tmp/argocd-diff2774063264/cert-manager:leaderelection
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:kube-system/cert-manager:leaderelection
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/Role:kube-system/cert-manager:leaderelection
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/RoleBinding cert-manager/cert-manager-cert-manager-tokenrequest ======
diff --git a/tmp/argocd-diff3743658658/cert-manager-cert-manager-tokenrequest-live.yaml b/tmp/argocd-diff3743658658/cert-manager-cert-manager-tokenrequest
index 0ea44107..e69de29b 100644
--- a/tmp/argocd-diff3743658658/cert-manager-cert-manager-tokenrequest-live.yaml
+++ b/tmp/argocd-diff3743658658/cert-manager-cert-manager-tokenrequest
@@ -1,64 +0,0 @@
-apiVersion: rbac.authorization.k8s.io/v1
-kind: RoleBinding
-metadata:
-  annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:cert-manager/cert-manager-cert-manager-tokenrequest
-  labels:
-    app: cert-manager
-    app.kubernetes.io/component: controller
-    app.kubernetes.io/instance: cert-manager
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
-  managedFields:
-  - apiVersion: rbac.authorization.k8s.io/v1
-    fieldsType: FieldsV1
-    fieldsV1:
-      f:metadata:
-        f:annotations:
-          f:argocd.argoproj.io/tracking-id: {}
-        f:labels:
-          f:app: {}
-          f:app.kubernetes.io/component: {}
-          f:app.kubernetes.io/instance: {}
-          f:app.kubernetes.io/managed-by: {}
-          f:app.kubernetes.io/name: {}
-          f:app.kubernetes.io/version: {}
-          f:helm.sh/chart: {}
-      f:roleRef: {}
-      f:subjects: {}
-    manager: argocd-controller
-    operation: Apply
-    time: "2025-04-24T15:36:08Z"
-  - apiVersion: rbac.authorization.k8s.io/v1
-    fieldsType: FieldsV1
-    fieldsV1:
-      f:metadata:
-        f:annotations:
-          .: {}
-          f:argocd.argoproj.io/tracking-id: {}
-        f:labels:
-          .: {}
-          f:app: {}
-          f:app.kubernetes.io/component: {}
-          f:app.kubernetes.io/instance: {}
-          f:app.kubernetes.io/managed-by: {}
-          f:app.kubernetes.io/name: {}
-      f:roleRef: {}
-      f:subjects: {}
-    manager: argocd-application-controller
-    operation: Update
-    time: "2024-10-10T09:11:45Z"
-  name: cert-manager-cert-manager-tokenrequest
-  namespace: cert-manager
-  resourceVersion: "37171772683"
-  uid: af9a7383-ede8-47b8-9743-50a530367244
-roleRef:
-  apiGroup: rbac.authorization.k8s.io
-  kind: Role
-  name: cert-manager-tokenrequest
-subjects:
-- kind: ServiceAccount
-  name: cert-manager
-  namespace: cert-manager

===== rbac.authorization.k8s.io/RoleBinding cert-manager/cert-manager-webhook:dynamic-serving ======
diff --git a/tmp/argocd-diff3784403140/cert-manager-webhook:dynamic-serving-live.yaml b/tmp/argocd-diff3784403140/cert-manager-webhook:dynamic-serving
index 07e4cecd..122d2154 100644
--- a/tmp/argocd-diff3784403140/cert-manager-webhook:dynamic-serving-live.yaml
+++ b/tmp/argocd-diff3784403140/cert-manager-webhook:dynamic-serving
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:cert-manager/cert-manager-webhook:dynamic-serving
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:cert-manager/cert-manager-webhook:dynamic-serving
   labels:
     app: webhook
     app.kubernetes.io/component: webhook
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: webhook
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/RoleBinding kube-system/cert-manager-cainjector:leaderelection ======
diff --git a/tmp/argocd-diff1651784127/cert-manager-cainjector:leaderelection-live.yaml b/tmp/argocd-diff1651784127/cert-manager-cainjector:leaderelection
index 0f438576..737628ab 100644
--- a/tmp/argocd-diff1651784127/cert-manager-cainjector:leaderelection-live.yaml
+++ b/tmp/argocd-diff1651784127/cert-manager-cainjector:leaderelection
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:kube-system/cert-manager-cainjector:leaderelection
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:kube-system/cert-manager-cainjector:leaderelection
   labels:
     app: cainjector
     app.kubernetes.io/component: cainjector
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cainjector
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/RoleBinding kube-system/cert-manager:leaderelection ======
diff --git a/tmp/argocd-diff3120303169/cert-manager:leaderelection-live.yaml b/tmp/argocd-diff3120303169/cert-manager:leaderelection
index c74c4531..97bc2012 100644
--- a/tmp/argocd-diff3120303169/cert-manager:leaderelection-live.yaml
+++ b/tmp/argocd-diff3120303169/cert-manager:leaderelection
@@ -2,15 +2,15 @@ apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
   annotations:
-    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:kube-system/cert-manager:leaderelection
+    argocd.argoproj.io/tracking-id: argocd_scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:kube-system/cert-manager:leaderelection
   labels:
     app: cert-manager
     app.kubernetes.io/component: controller
     app.kubernetes.io/instance: cert-manager
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: cert-manager
-    app.kubernetes.io/version: v1.17.2
-    helm.sh/chart: cert-manager-v1.17.2
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
   managedFields:
   - apiVersion: rbac.authorization.k8s.io/v1
     fieldsType: FieldsV1

===== rbac.authorization.k8s.io/RoleBinding cert-manager/cert-manager-tokenrequest ======
diff --git a/tmp/argocd-diff1247633166/cert-manager-tokenrequest-live.yaml b/tmp/argocd-diff1247633166/cert-manager-tokenrequest
index e69de29b..e0d62f42 100644
--- a/tmp/argocd-diff1247633166/cert-manager-tokenrequest-live.yaml
+++ b/tmp/argocd-diff1247633166/cert-manager-tokenrequest
@@ -0,0 +1,23 @@
+apiVersion: rbac.authorization.k8s.io/v1
+kind: RoleBinding
+metadata:
+  annotations:
+    argocd.argoproj.io/tracking-id: scaleway-parca-demo-cert-manager:rbac.authorization.k8s.io/RoleBinding:cert-manager/cert-manager-tokenrequest
+  labels:
+    app: cert-manager
+    app.kubernetes.io/component: controller
+    app.kubernetes.io/instance: cert-manager
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/name: cert-manager
+    app.kubernetes.io/version: v1.19.1
+    helm.sh/chart: cert-manager-v1.19.1
+  name: cert-manager-tokenrequest
+  namespace: cert-manager
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: Role
+  name: cert-manager-tokenrequest
+subjects:
+- kind: ServiceAccount
+  name: cert-manager
+  namespace: cert-manager

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant