C:\Users\shaba>kubectl version
Client Version: version.Info{Major:"1", Minor:"16", GitVersion:"v1.16.0", GitCommit:"2bd9643cee5b3b3a5ecbd3af49d09018f0773c77", GitTreeState:"clean", BuildDate:"2019-09-18T14:36:53Z", GoVersion:"go1.12.9", Compiler:"gc", Platform:"windows/amd64"}
Server Version: version.Info{Major:"1", Minor:"17", GitVersion:"v1.17.0", GitCommit:"70132b0f130acc0bed193d9ba59dd186f0e634cf", GitTreeState:"clean", BuildDate:"2019-12-07T21:12:17Z", GoVersion:"go1.13.4", Compiler:"gc", Platform:"linux/amd64"}
C:\Users\shaba>curl -sSL https://nats-io.github.io/k8s/setup.sh | sh
serviceaccount/nats-setup unchanged
clusterrolebinding.rbac.authorization.k8s.io/nats-setup-binding unchanged
clusterrole.rbac.authorization.k8s.io/nats-setup unchanged
pod/nats-setup created
pod/nats-setup condition met
�[0;36m
##############################################
# #
# _ _ _ _____ ____ _ _____ ____ #
# | \ | | / \|_ _/ ___| | |/ ( _ ) ___| #
# | \| | / _ \ | | \___ \ | ' // _ \___ \ #
# | |\ |/ ___ \| | ___) || . \ (_) |__) | #
# |_| \_/_/ \_\_| |____(_)_|\_\___/____/ #
# #
# nats-setup (v0.1.6) #
##############################################
+---------------------+---------------------+
| OPTIONS |
+---------------------+---------------------+
nats server | true
nats surveyor | true
nats tls | true
enable auth | true
install cert_manager | true
nats streaming | true
+-------------------------------------------+
| |
| Starting setup... |
| |
+-------------------------------------------+
�[0m
[ OK ] generated and stored operator key "OD3F4GS2W7QU5FYH2BRNWB6KEZWFNRXPIT2OAKT32J4JOFRUAQ75E5E3"
[ OK ] added operator "KO"
[ OK ] generated and stored account key "AAY2NHFCJWFZIWRDHMCXC2TTOYSANUP3KFSOGRGPOFFEZ2QH4JYOR3F7"
[ OK ] added account "SYS"
[ OK ] generated and stored user key "UCPPAMVDMVYSMT2XGSIAJH7ZRNF4O6HX6QBLWIMWCC3HJHTTDM65WNZX"
[ OK ] generated user creds file "/nsc/nkeys/creds/KO/SYS/sys.creds"
[ OK ] added user "sys" to account "SYS"
[ OK ] generated and stored account key "ABJTXIXBUD2BYNCGMZCGA3JLMS52G6PRDWNUMWIABAIVITDOC3HTOXTZ"
[ OK ] added account "A"
[ OK ] generated and stored user key "UAMESDT2UVI55MHW2EN54ZK6X3TBKD7ENBY7JARVKHDFMZYAFZMMWSOC"
[ OK ] generated user creds file "/nsc/nkeys/creds/KO/A/test.creds"
[ OK ] added user "test" to account "A"
[ OK ] added public service export "test"
[ OK ] generated and stored account key "AD5Z7JHDHWITERN3GM4T4Y3CL7J2U4EXJC752ASCLP6BL7KTYHKYMAMS"
[ OK ] added account "B"
[ OK ] generated and stored user key "UBLYHPWT6OIFN4H5NJ7TXP643G6NT6VSQSFD4QTWCQLAI7GOZELCQI5P"
[ OK ] generated user creds file "/nsc/nkeys/creds/KO/B/test.creds"
[ OK ] added user "test" to account "B"
[ OK ] added service import "test"
[ OK ] generated and stored account key "AD24ZVRHQ4AFKP36NOANJMS4OV2LP7R4JVH2LEVTKRAHODWLZ5OEMYGB"
[ OK ] added account "STAN"
[ OK ] generated and stored user key "UARAQCJ6ZH4WZJTYRDUTXTQNZNBUDU4WKZODQN7SMZCUDQMFLQ2QH44X"
[ OK ] generated user creds file "/nsc/nkeys/creds/KO/STAN/stan.creds"
[ OK ] added user "stan" to account "STAN"
secret/nats-sys-creds created
secret/nats-test-creds created
secret/nats-test2-creds created
secret/stan-creds created
configmap/nats-accounts created
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io configured
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io configured
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io configured
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io configured
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io configured
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
namespace/cert-manager configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
serviceaccount/cert-manager-cainjector configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
serviceaccount/cert-manager configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
serviceaccount/cert-manager-webhook configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
role.rbac.authorization.k8s.io/cert-manager:leaderelection configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim configured
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-leaderelection created
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-view configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
clusterrole.rbac.authorization.k8s.io/cert-manager-edit configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
service/cert-manager configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
service/cert-manager-webhook configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
apiservice.apiregistration.k8s.io/v1beta1.webhook.cert-manager.io created
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured
Warning: kubectl apply should be used on resource created by either kubectl create --save-config or kubectl apply
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured
Error from server (Invalid): error when applying patch:
{"metadata":{"annotations":{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"apps/v1\",\"kind\":\"Deployment\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cainjector\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cainjector\",\"helm.sh/chart\":\"cainjector-v0.11.0\"},\"name\":\"cert-manager-cainjector\",\"namespace\":\"cert-manager\"},\"spec\":{\"replicas\":1,\"selector\":{\"matchLabels\":{\"app\":\"cainjector\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cainjector\"}},\"template\":{\"metadata\":{\"annotations\":null,\"labels\":{\"app\":\"cainjector\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cainjector\",\"helm.sh/chart\":\"cainjector-v0.11.0\"}},\"spec\":{\"containers\":[{\"args\":[\"--v=2\",\"--leader-election-namespace=kube-system\"],\"env\":[{\"name\":\"POD_NAMESPACE\",\"valueFrom\":{\"fieldRef\":{\"fieldPath\":\"metadata.namespace\"}}}],\"image\":\"quay.io/jetstack/cert-manager-cainjector:v0.11.0\",\"imagePullPolicy\":\"IfNotPresent\",\"name\":\"cainjector\",\"resources\":{}}],\"serviceAccountName\":\"cert-manager-cainjector\"}}}}\n"},"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cainjector-v0.11.0"}},"spec":{"selector":{"matchLabels":{"app.kubernetes.io/managed-by":"Tiller"}},"template":{"metadata":{"annotations":null,"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cainjector-v0.11.0"}},"spec":{"$setElementOrder/containers":[{"name":"cainjector"}],"containers":[{"args":["--v=2","--leader-election-namespace=kube-system"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"image":"quay.io/jetstack/cert-manager-cainjector:v0.11.0","imagePullPolicy":"IfNotPresent","name":"cainjector","resources":{}}]}}}}
to:
Resource: "apps/v1, Resource=deployments", GroupVersionKind: "apps/v1, Kind=Deployment"
Name: "cert-manager-cainjector", Namespace: "cert-manager"
Object: &{map["apiVersion":"apps/v1" "kind":"Deployment" "metadata":map["annotations":map["deployment.kubernetes.io/revision":"1"] "creationTimestamp":"2019-12-21T05:50:11Z" "generation":'\x01' "labels":map["app":"cainjector" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cainjector" "helm.sh/chart":"cert-manager-v0.12.0"] "name":"cert-manager-cainjector" "namespace":"cert-manager" "resourceVersion":"4691181" "selfLink":"/apis/apps/v1/namespaces/cert-manager/deployments/cert-manager-cainjector" "uid":"755f626f-7006-41ef-9456-a595b437e729"] "spec":map["progressDeadlineSeconds":'\u0258' "replicas":'\x01' "revisionHistoryLimit":'\n' "selector":map["matchLabels":map["app":"cainjector" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cainjector"]] "strategy":map["rollingUpdate":map["maxSurge":"25%" "maxUnavailable":"25%"] "type":"RollingUpdate"] "template":map["metadata":map["creationTimestamp":<nil> "labels":map["app":"cainjector" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cainjector" "helm.sh/chart":"cert-manager-v0.12.0"]] "spec":map["containers":[map["args":["--v=2" "--leader-election-namespace=kube-system"] "env":[map["name":"POD_NAMESPACE" "valueFrom":map["fieldRef":map["apiVersion":"v1" "fieldPath":"metadata.namespace"]]]] "image":"quay.io/jetstack/cert-manager-cainjector:v0.12.0" "imagePullPolicy":"IfNotPresent" "name":"cert-manager" "resources":map[] "terminationMessagePath":"/dev/termination-log" "terminationMessagePolicy":"File"]] "dnsPolicy":"ClusterFirst" "restartPolicy":"Always" "schedulerName":"default-scheduler" "securityContext":map[] "serviceAccount":"cert-manager-cainjector" "serviceAccountName":"cert-manager-cainjector" "terminationGracePeriodSeconds":'\x1e']]] "status":map["availableReplicas":'\x01' "conditions":[map["lastTransitionTime":"2019-12-21T05:50:11Z" "lastUpdateTime":"2019-12-21T05:50:16Z" "message":"ReplicaSet \"cert-manager-cainjector-85fbdf788\" has successfully progressed." "reason":"NewReplicaSetAvailable" "status":"True" "type":"Progressing"] map["lastTransitionTime":"2019-12-21T07:41:58Z" "lastUpdateTime":"2019-12-21T07:41:58Z" "message":"Deployment has minimum availability." "reason":"MinimumReplicasAvailable" "status":"True" "type":"Available"]] "observedGeneration":'\x01' "readyReplicas":'\x01' "replicas":'\x01' "updatedReplicas":'\x01']]}
for: "https://github.com/jetstack/cert-manager/releases/download/v0.11.0/cert-manager.yaml": Deployment.apps "cert-manager-cainjector" is invalid: spec.selector: Invalid value: v1.LabelSelector{MatchLabels:map[string]string{"app":"cainjector", "app.kubernetes.io/instance":"cert-manager", "app.kubernetes.io/managed-by":"Tiller", "app.kubernetes.io/name":"cainjector"}, MatchExpressions:[]v1.LabelSelectorRequirement(nil)}: field is immutable
Error from server (Invalid): error when applying patch:
{"metadata":{"annotations":{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"apps/v1\",\"kind\":\"Deployment\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cert-manager\",\"helm.sh/chart\":\"cert-manager-v0.11.0\"},\"name\":\"cert-manager\",\"namespace\":\"cert-manager\"},\"spec\":{\"replicas\":1,\"selector\":{\"matchLabels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cert-manager\"}},\"template\":{\"metadata\":{\"annotations\":{\"prometheus.io/path\":\"/metrics\",\"prometheus.io/port\":\"9402\",\"prometheus.io/scrape\":\"true\"},\"labels\":{\"app\":\"cert-manager\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"cert-manager\",\"helm.sh/chart\":\"cert-manager-v0.11.0\"}},\"spec\":{\"containers\":[{\"args\":[\"--v=2\",\"--cluster-resource-namespace=$(POD_NAMESPACE)\",\"--leader-election-namespace=kube-system\",\"--webhook-namespace=$(POD_NAMESPACE)\",\"--webhook-ca-secret=cert-manager-webhook-ca\",\"--webhook-serving-secret=cert-manager-webhook-tls\",\"--webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc\"],\"env\":[{\"name\":\"POD_NAMESPACE\",\"valueFrom\":{\"fieldRef\":{\"fieldPath\":\"metadata.namespace\"}}}],\"image\":\"quay.io/jetstack/cert-manager-controller:v0.11.0\",\"imagePullPolicy\":\"IfNotPresent\",\"name\":\"cert-manager\",\"ports\":[{\"containerPort\":9402}],\"resources\":{\"requests\":{\"cpu\":\"10m\",\"memory\":\"32Mi\"}}}],\"serviceAccountName\":\"cert-manager\"}}}}\n"},"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.11.0"}},"spec":{"selector":{"matchLabels":{"app.kubernetes.io/managed-by":"Tiller"}},"template":{"metadata":{"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.11.0"}},"spec":{"$setElementOrder/containers":[{"name":"cert-manager"}],"containers":[{"image":"quay.io/jetstack/cert-manager-controller:v0.11.0","name":"cert-manager","resources":{"requests":{"cpu":"10m","memory":"32Mi"}}}]}}}}
to:
Resource: "apps/v1, Resource=deployments", GroupVersionKind: "apps/v1, Kind=Deployment"
Name: "cert-manager", Namespace: "cert-manager"
Object: &{map["apiVersion":"apps/v1" "kind":"Deployment" "metadata":map["annotations":map["deployment.kubernetes.io/revision":"1"] "creationTimestamp":"2019-12-21T05:50:11Z" "generation":'\x01' "labels":map["app":"cert-manager" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cert-manager" "helm.sh/chart":"cert-manager-v0.12.0"] "name":"cert-manager" "namespace":"cert-manager" "resourceVersion":"4691187" "selfLink":"/apis/apps/v1/namespaces/cert-manager/deployments/cert-manager" "uid":"e7167ce2-f8d4-410f-b019-cefbec0cc466"] "spec":map["progressDeadlineSeconds":'\u0258' "replicas":'\x01' "revisionHistoryLimit":'\n' "selector":map["matchLabels":map["app":"cert-manager" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cert-manager"]] "strategy":map["rollingUpdate":map["maxSurge":"25%" "maxUnavailable":"25%"] "type":"RollingUpdate"] "template":map["metadata":map["annotations":map["prometheus.io/path":"/metrics" "prometheus.io/port":"9402" "prometheus.io/scrape":"true"] "creationTimestamp":<nil> "labels":map["app":"cert-manager" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"cert-manager" "helm.sh/chart":"cert-manager-v0.12.0"]] "spec":map["containers":[map["args":["--v=2" "--cluster-resource-namespace=$(POD_NAMESPACE)" "--leader-election-namespace=kube-system" "--webhook-namespace=$(POD_NAMESPACE)" "--webhook-ca-secret=cert-manager-webhook-ca" "--webhook-serving-secret=cert-manager-webhook-tls" "--webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc"] "env":[map["name":"POD_NAMESPACE" "valueFrom":map["fieldRef":map["apiVersion":"v1" "fieldPath":"metadata.namespace"]]]] "image":"quay.io/jetstack/cert-manager-controller:v0.12.0" "imagePullPolicy":"IfNotPresent" "name":"cert-manager" "ports":[map["containerPort":'\u24ba' "protocol":"TCP"]] "resources":map[] "terminationMessagePath":"/dev/termination-log" "terminationMessagePolicy":"File"]] "dnsPolicy":"ClusterFirst" "restartPolicy":"Always" "schedulerName":"default-scheduler" "securityContext":map[] "serviceAccount":"cert-manager" "serviceAccountName":"cert-manager" "terminationGracePeriodSeconds":'\x1e']]] "status":map["availableReplicas":'\x01' "conditions":[map["lastTransitionTime":"2019-12-21T05:50:11Z" "lastUpdateTime":"2019-12-21T05:50:16Z" "message":"ReplicaSet \"cert-manager-754d9b75d9\" has successfully progressed." "reason":"NewReplicaSetAvailable" "status":"True" "type":"Progressing"] map["lastTransitionTime":"2019-12-21T07:41:58Z" "lastUpdateTime":"2019-12-21T07:41:58Z" "message":"Deployment has minimum availability." "reason":"MinimumReplicasAvailable" "status":"True" "type":"Available"]] "observedGeneration":'\x01' "readyReplicas":'\x01' "replicas":'\x01' "updatedReplicas":'\x01']]}
for: "https://github.com/jetstack/cert-manager/releases/download/v0.11.0/cert-manager.yaml": Deployment.apps "cert-manager" is invalid: spec.selector: Invalid value: v1.LabelSelector{MatchLabels:map[string]string{"app":"cert-manager", "app.kubernetes.io/instance":"cert-manager", "app.kubernetes.io/managed-by":"Tiller", "app.kubernetes.io/name":"cert-manager"}, MatchExpressions:[]v1.LabelSelectorRequirement(nil)}: field is immutable
Error from server (Invalid): error when applying patch:
{"metadata":{"annotations":{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"apps/v1\",\"kind\":\"Deployment\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"webhook\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"webhook\",\"helm.sh/chart\":\"cert-manager-v0.11.0\"},\"name\":\"cert-manager-webhook\",\"namespace\":\"cert-manager\"},\"spec\":{\"replicas\":1,\"selector\":{\"matchLabels\":{\"app\":\"webhook\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"webhook\"}},\"template\":{\"metadata\":{\"annotations\":null,\"labels\":{\"app\":\"webhook\",\"app.kubernetes.io/instance\":\"cert-manager\",\"app.kubernetes.io/managed-by\":\"Tiller\",\"app.kubernetes.io/name\":\"webhook\",\"helm.sh/chart\":\"cert-manager-v0.11.0\"}},\"spec\":{\"containers\":[{\"args\":[\"--v=2\",\"--secure-port=6443\",\"--tls-cert-file=/certs/tls.crt\",\"--tls-private-key-file=/certs/tls.key\"],\"env\":[{\"name\":\"POD_NAMESPACE\",\"valueFrom\":{\"fieldRef\":{\"fieldPath\":\"metadata.namespace\"}}}],\"image\":\"quay.io/jetstack/cert-manager-webhook:v0.11.0\",\"imagePullPolicy\":\"IfNotPresent\",\"name\":\"cert-manager\",\"resources\":{},\"volumeMounts\":[{\"mountPath\":\"/certs\",\"name\":\"certs\"}]}],\"serviceAccountName\":\"cert-manager-webhook\",\"volumes\":[{\"name\":\"certs\",\"secret\":{\"secretName\":\"cert-manager-webhook-tls\"}}]}}}}\n"},"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.11.0"}},"spec":{"selector":{"matchLabels":{"app.kubernetes.io/managed-by":"Tiller"}},"template":{"metadata":{"annotations":null,"labels":{"app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.11.0"}},"spec":{"$setElementOrder/containers":[{"name":"cert-manager"}],"containers":[{"args":["--v=2","--secure-port=6443","--tls-cert-file=/certs/tls.crt","--tls-private-key-file=/certs/tls.key"],"image":"quay.io/jetstack/cert-manager-webhook:v0.11.0","name":"cert-manager"}]}}}}
to:
Resource: "apps/v1, Resource=deployments", GroupVersionKind: "apps/v1, Kind=Deployment"
Name: "cert-manager-webhook", Namespace: "cert-manager"
Object: &{map["apiVersion":"apps/v1" "kind":"Deployment" "metadata":map["annotations":map["deployment.kubernetes.io/revision":"1"] "creationTimestamp":"2019-12-21T05:50:11Z" "generation":'\x01' "labels":map["app":"webhook" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"webhook" "helm.sh/chart":"cert-manager-v0.12.0"] "name":"cert-manager-webhook" "namespace":"cert-manager" "resourceVersion":"4691199" "selfLink":"/apis/apps/v1/namespaces/cert-manager/deployments/cert-manager-webhook" "uid":"ccd586ea-d4af-4b27-b179-fe2f1aceab77"] "spec":map["progressDeadlineSeconds":'\u0258' "replicas":'\x01' "revisionHistoryLimit":'\n' "selector":map["matchLabels":map["app":"webhook" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"webhook"]] "strategy":map["rollingUpdate":map["maxSurge":"25%" "maxUnavailable":"25%"] "type":"RollingUpdate"] "template":map["metadata":map["creationTimestamp":<nil> "labels":map["app":"webhook" "app.kubernetes.io/instance":"cert-manager" "app.kubernetes.io/managed-by":"Helm" "app.kubernetes.io/name":"webhook" "helm.sh/chart":"cert-manager-v0.12.0"]] "spec":map["containers":[map["args":["--v=2" "--secure-port=10250" "--tls-cert-file=/certs/tls.crt" "--tls-private-key-file=/certs/tls.key"] "env":[map["name":"POD_NAMESPACE" "valueFrom":map["fieldRef":map["apiVersion":"v1" "fieldPath":"metadata.namespace"]]]] "image":"quay.io/jetstack/cert-manager-webhook:v0.12.0" "imagePullPolicy":"IfNotPresent" "livenessProbe":map["failureThreshold":'\x03' "httpGet":map["path":"/livez" "port":'\u17c0' "scheme":"HTTP"] "periodSeconds":'\n' "successThreshold":'\x01' "timeoutSeconds":'\x01'] "name":"cert-manager" "readinessProbe":map["failureThreshold":'\x03' "httpGet":map["path":"/healthz" "port":'\u17c0' "scheme":"HTTP"] "periodSeconds":'\n' "successThreshold":'\x01' "timeoutSeconds":'\x01'] "resources":map[] "terminationMessagePath":"/dev/termination-log" "terminationMessagePolicy":"File" "volumeMounts":[map["mountPath":"/certs" "name":"certs"]]]] "dnsPolicy":"ClusterFirst" "restartPolicy":"Always" "schedulerName":"default-scheduler" "securityContext":map[] "serviceAccount":"cert-manager-webhook" "serviceAccountName":"cert-manager-webhook" "terminationGracePeriodSeconds":'\x1e' "volumes":[map["name":"certs" "secret":map["defaultMode":'\u01a4' "secretName":"cert-manager-webhook-tls"]]]]]] "status":map["availableReplicas":'\x01' "conditions":[map["lastTransitionTime":"2019-12-21T05:50:11Z" "lastUpdateTime":"2019-12-21T05:50:38Z" "message":"ReplicaSet \"cert-manager-webhook-76f9b64b45\" has successfully progressed." "reason":"NewReplicaSetAvailable" "status":"True" "type":"Progressing"] map["lastTransitionTime":"2019-12-21T07:42:00Z" "lastUpdateTime":"2019-12-21T07:42:00Z" "message":"Deployment has minimum availability." "reason":"MinimumReplicasAvailable" "status":"True" "type":"Available"]] "observedGeneration":'\x01' "readyReplicas":'\x01' "replicas":'\x01' "updatedReplicas":'\x01']]}
for: "https://github.com/jetstack/cert-manager/releases/download/v0.11.0/cert-manager.yaml": Deployment.apps "cert-manager-webhook" is invalid: spec.selector: Invalid value: v1.LabelSelector{MatchLabels:map[string]string{"app":"webhook", "app.kubernetes.io/instance":"cert-manager", "app.kubernetes.io/managed-by":"Tiller", "app.kubernetes.io/name":"webhook"}, MatchExpressions:[]v1.LabelSelectorRequirement(nil)}: field is immutable
command terminated with exit code 1