[INFO] Fetching and executing solve-pr-pairing.sh... [INFO] Loading env vars from parameters [INFO] Updating image repository to quay.io/redhat-user-workloads/rhtap-build-tenant/build-service/build-service [INFO] Updating image tag to on-pr-fef8c0a62b356836a6a6273532c10274374b7b39 [INFO] Updating GitHub reference to flacatus@fef8c0a62b356836a6a6273532c10274374b7b39 [INFO] kubernetes cluster is hosted on: https://52.33.4.34:6443 Kubernetes control plane is running at https://52.33.4.34:6443 CoreDNS is running at https://52.33.4.34:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [INFO] Installing Konflux CI dependencies ๐Ÿ” Checking requirements kubectl is installed openssl is installed Checking kubectl version kubectl version v1.35.1 meets minimum requirement (v1.31.4) All requirements are met Continue ๐Ÿงช Testing PVC creation for default storage class Creating PVC from './dependencies/pre-deployment-pvc-binding' using the cluster's default storage class namespace/test-pvc-ns created persistentvolumeclaim/test-pvc created pod/test-pvc-consumer created persistentvolumeclaim/test-pvc condition met namespace "test-pvc-ns" deleted persistentvolumeclaim "test-pvc" deleted from test-pvc-ns namespace pod "test-pvc-consumer" deleted from test-pvc-ns namespace PVC binding successfull ๐ŸŒŠ Deploying Konflux Dependencies ๐Ÿ” Deploying Cert Manager... namespace/cert-manager created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created serviceaccount/cert-manager created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager-startupapicheck created serviceaccount/cert-manager-webhook created role.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created rolebinding.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created service/cert-manager created service/cert-manager-cainjector created service/cert-manager-webhook created deployment.apps/cert-manager created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager-webhook created job.batch/cert-manager-startupapicheck created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met ๐Ÿค Deploying Trust Manager... customresourcedefinition.apiextensions.k8s.io/bundles.trust.cert-manager.io created serviceaccount/trust-manager created role.rbac.authorization.k8s.io/trust-manager created role.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/trust-manager created service/trust-manager created service/trust-manager-metrics created deployment.apps/trust-manager created certificate.cert-manager.io/trust-manager created issuer.cert-manager.io/trust-manager created validatingwebhookconfiguration.admissionregistration.k8s.io/trust-manager created pod/trust-manager-865b9c84ff-q6dlz condition met ๐Ÿ“œ Setting up Cluster Issuer... Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/selfsigned-ca created clusterissuer.cert-manager.io/ca-issuer created clusterissuer.cert-manager.io/self-signed-cluster-issuer created ๐Ÿฑ Deploying Tekton... ๐Ÿฑ Installing Tekton Operator... namespace/tekton-operator created customresourcedefinition.apiextensions.k8s.io/manualapprovalgates.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonchains.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonconfigs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektondashboards.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonhubs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektoninstallersets.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpipelines.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpruners.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonresults.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektontriggers.operator.tekton.dev created serviceaccount/tekton-operator created role.rbac.authorization.k8s.io/tekton-operator-info created clusterrole.rbac.authorization.k8s.io/tekton-config-read-role created clusterrole.rbac.authorization.k8s.io/tekton-operator created clusterrole.rbac.authorization.k8s.io/tekton-result-read-role created rolebinding.rbac.authorization.k8s.io/tekton-operator-info created clusterrolebinding.rbac.authorization.k8s.io/tekton-config-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-operator created clusterrolebinding.rbac.authorization.k8s.io/tekton-result-read-rolebinding created configmap/config-logging created configmap/tekton-config-defaults created configmap/tekton-config-observability created configmap/tekton-operator-controller-config-leader-election created configmap/tekton-operator-info created configmap/tekton-operator-webhook-config-leader-election created secret/tekton-operator-webhook-certs created service/tekton-operator created service/tekton-operator-webhook created deployment.apps/tekton-operator created deployment.apps/tekton-operator-webhook created pod/tekton-operator-864c79545c-4kwlq condition met pod/tekton-operator-webhook-b678db645-sxk7k condition met tektonconfig.operator.tekton.dev/config condition met โš™๏ธ Configuring Tekton... Warning: resource tektonconfigs/config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. tektonconfig.operator.tekton.dev/config configured ๐Ÿ”„ Setting up Pipeline As Code... namespace/pipelines-as-code created customresourcedefinition.apiextensions.k8s.io/repositories.pipelinesascode.tekton.dev created serviceaccount/pipelines-as-code-controller created serviceaccount/pipelines-as-code-watcher created serviceaccount/pipelines-as-code-webhook created role.rbac.authorization.k8s.io/pipelines-as-code-controller-role created role.rbac.authorization.k8s.io/pipelines-as-code-info created role.rbac.authorization.k8s.io/pipelines-as-code-watcher-role created role.rbac.authorization.k8s.io/pipelines-as-code-webhook-role created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-controller-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-watcher-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-webhook-clusterrole created clusterrole.rbac.authorization.k8s.io/pipelines-as-code-aggregate created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-info created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-binding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-clusterbinding created configmap/pac-config-logging created configmap/pac-watcher-config-leader-election created configmap/pac-webhook-config-leader-election created configmap/pipelines-as-code created configmap/pipelines-as-code-config-observability created configmap/pipelines-as-code-info created secret/pipelines-as-code-webhook-certs created service/pipelines-as-code-controller created service/pipelines-as-code-watcher created service/pipelines-as-code-webhook created deployment.apps/pipelines-as-code-controller created deployment.apps/pipelines-as-code-watcher created deployment.apps/pipelines-as-code-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.pipelinesascode.tekton.dev created tektonconfig.operator.tekton.dev/config condition met ๐Ÿ” Setting up Tekton Chains RBAC... namespace/openshift-pipelines created serviceaccount/chains-secrets-admin created role.rbac.authorization.k8s.io/chains-secret-admin created role.rbac.authorization.k8s.io/chains-secret-admin created clusterrole.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created job.batch/tekton-chains-signing-secret created ๐Ÿ”‘ Deploying Dex... namespace/dex created serviceaccount/dex created clusterrole.rbac.authorization.k8s.io/dex created clusterrolebinding.rbac.authorization.k8s.io/dex created configmap/dex-kth87d6k48 created service/dex created deployment.apps/dex created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/dex-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Creating secret oauth2-proxy-client-secret secret/oauth2-proxy-client-secret created ๐Ÿ“ฆ Deploying Registry... namespace/kind-registry created configmap/zot-config created service/registry-service created deployment.apps/registry created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/registry-cert created bundle.trust.cert-manager.io/trusted-ca created pod/registry-5b599f9d9d-dfc55 condition met ๐Ÿ”„ Deploying Smee... Randomizing smee-channel ID namespace/smee-client created deployment.apps/gosmee-client created ๐Ÿ›ก๏ธ Deploying Kyverno... namespace/kyverno serverside-applied customresourcedefinition.apiextensions.k8s.io/cleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clustercleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/deletingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/ephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/generatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/globalcontextentries.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/imagevalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/mutatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespaceddeletingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedgeneratingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedimagevalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedmutatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedvalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/updaterequests.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/validatingpolicies.policies.kyverno.io serverside-applied serviceaccount/kyverno-admission-controller serverside-applied serviceaccount/kyverno-background-controller serverside-applied serviceaccount/kyverno-cleanup-controller serverside-applied serviceaccount/kyverno-reports-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno-manage-resources serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller:core serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller:view serverside-applied configmap/kyverno serverside-applied configmap/kyverno-metrics serverside-applied service/kyverno-background-controller-metrics serverside-applied service/kyverno-cleanup-controller serverside-applied service/kyverno-cleanup-controller-metrics serverside-applied service/kyverno-reports-controller-metrics serverside-applied service/kyverno-svc serverside-applied service/kyverno-svc-metrics serverside-applied deployment.apps/kyverno-admission-controller serverside-applied deployment.apps/kyverno-background-controller serverside-applied deployment.apps/kyverno-cleanup-controller serverside-applied deployment.apps/kyverno-reports-controller serverside-applied clusterpolicy.kyverno.io/reduce-tekton-pr-taskrun-resource-requests created clusterpolicy.kyverno.io/set-skip-checks-parameter created ๐Ÿ“‹ Deploying Konflux Info... namespace/konflux-info created role.rbac.authorization.k8s.io/konflux-public-info-view-role created rolebinding.rbac.authorization.k8s.io/konflux-public-info-view-rb created configmap/konflux-banner-configmap created configmap/konflux-public-info created โณ Waiting for the dependencies to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/metrics-server condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/metrics-server condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met [INFO] Installing Konflux CI... Deploying Konflux ๐Ÿš€ Deploying Application API CRDs... customresourcedefinition.apiextensions.k8s.io/applications.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/componentdetectionqueries.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/components.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclaims.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclasses.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargets.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/environments.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/promotionruns.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshotenvironmentbindings.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshots.appstudio.redhat.com created ๐Ÿ‘ฅ Setting up RBAC permissions... clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-batch created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-self-access-reviewer created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions-extra created ๐Ÿ“œ Deploying Enterprise Contract... namespace/enterprise-contract-service created customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role created rolebinding.rbac.authorization.k8s.io/public-ec-cm created rolebinding.rbac.authorization.k8s.io/public-ecp created configmap/ec-defaults created resource mapping not found for name: "all" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "default" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-no-hermetic" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-trusted-tasks" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "slsa3" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first ๐Ÿ”„ Retrying command (attempt 2/3)... namespace/enterprise-contract-service unchanged customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role unchanged rolebinding.rbac.authorization.k8s.io/public-ec-cm unchanged rolebinding.rbac.authorization.k8s.io/public-ecp unchanged configmap/ec-defaults unchanged enterprisecontractpolicy.appstudio.redhat.com/all created enterprisecontractpolicy.appstudio.redhat.com/default created enterprisecontractpolicy.appstudio.redhat.com/redhat created enterprisecontractpolicy.appstudio.redhat.com/redhat-no-hermetic created enterprisecontractpolicy.appstudio.redhat.com/redhat-trusted-tasks created enterprisecontractpolicy.appstudio.redhat.com/slsa3 created ๐ŸŽฏ Deploying Release Service... namespace/release-service serverside-applied customresourcedefinition.apiextensions.k8s.io/internalrequests.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/internalservicesconfigs.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplanadmissions.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplans.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releases.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseserviceconfigs.appstudio.redhat.com serverside-applied serviceaccount/release-service-controller-manager serverside-applied role.rbac.authorization.k8s.io/release-service-leader-election-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-pipeline-resource-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-application-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-component-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-environment-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-manager-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-metrics-auth-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-tekton-role serverside-applied clusterrole.rbac.authorization.k8s.io/releaseserviceconfig-role serverside-applied rolebinding.rbac.authorization.k8s.io/release-service-leader-election-rolebinding serverside-applied rolebinding.rbac.authorization.k8s.io/releaseserviceconfigs-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-application-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-component-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-environment-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-manager-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-metrics-auth-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-release-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplan-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplanadmission-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshot-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-tekton-role-binding serverside-applied configmap/release-service-manager-config serverside-applied configmap/release-service-manager-properties serverside-applied service/release-service-controller-manager-metrics-service serverside-applied service/release-service-webhook-service serverside-applied deployment.apps/release-service-controller-manager serverside-applied Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/serving-cert serverside-applied issuer.cert-manager.io/selfsigned-issuer serverside-applied mutatingwebhookconfiguration.admissionregistration.k8s.io/release-service-mutating-webhook-configuration serverside-applied validatingwebhookconfiguration.admissionregistration.k8s.io/release-service-validating-webhook-configuration serverside-applied error: resource mapping not found for name: "release-service-config" namespace: "release-service" from "./konflux-ci/release": no matches for kind "ReleaseServiceConfig" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first ๐Ÿ”„ Retrying command (attempt 2/3)... namespace/release-service serverside-applied customresourcedefinition.apiextensions.k8s.io/internalrequests.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/internalservicesconfigs.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplanadmissions.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplans.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releases.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseserviceconfigs.appstudio.redhat.com serverside-applied serviceaccount/release-service-controller-manager serverside-applied role.rbac.authorization.k8s.io/release-service-leader-election-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-pipeline-resource-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-application-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-component-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-environment-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-manager-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-metrics-auth-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-tekton-role serverside-applied clusterrole.rbac.authorization.k8s.io/releaseserviceconfig-role serverside-applied rolebinding.rbac.authorization.k8s.io/release-service-leader-election-rolebinding serverside-applied rolebinding.rbac.authorization.k8s.io/releaseserviceconfigs-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-application-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-component-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-environment-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-manager-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-metrics-auth-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-release-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplan-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplanadmission-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshot-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-tekton-role-binding serverside-applied configmap/release-service-manager-config serverside-applied configmap/release-service-manager-properties serverside-applied service/release-service-controller-manager-metrics-service serverside-applied service/release-service-webhook-service serverside-applied deployment.apps/release-service-controller-manager serverside-applied releaseserviceconfig.appstudio.redhat.com/release-service-config serverside-applied certificate.cert-manager.io/serving-cert serverside-applied issuer.cert-manager.io/selfsigned-issuer serverside-applied mutatingwebhookconfiguration.admissionregistration.k8s.io/release-service-mutating-webhook-configuration serverside-applied validatingwebhookconfiguration.admissionregistration.k8s.io/release-service-validating-webhook-configuration serverside-applied ๐Ÿ—๏ธ Deploying Build Service... namespace/build-service created serviceaccount/build-service-controller-manager created role.rbac.authorization.k8s.io/build-service-build-pipeline-config-read-only created role.rbac.authorization.k8s.io/build-service-leader-election-role created clusterrole.rbac.authorization.k8s.io/appstudio-pipelines-runner created clusterrole.rbac.authorization.k8s.io/build-service-manager-role created clusterrole.rbac.authorization.k8s.io/build-service-metrics-auth-role created rolebinding.rbac.authorization.k8s.io/build-pipeline-config-read-only-binding created rolebinding.rbac.authorization.k8s.io/build-service-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-pipeline-runner-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-service-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-service-metrics-auth-rolebinding created configmap/build-pipeline-config created service/build-service-controller-manager-metrics-service created deployment.apps/build-service-controller-manager created ๐Ÿ”„ Deploying Integration Service... namespace/integration-service created customresourcedefinition.apiextensions.k8s.io/componentgroups.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/integrationtestscenarios.appstudio.redhat.com created serviceaccount/integration-service-controller-manager created serviceaccount/integration-service-snapshot-garbage-collector created role.rbac.authorization.k8s.io/integration-service-leader-election-role created clusterrole.rbac.authorization.k8s.io/integration-service-componentgroup-admin-role created clusterrole.rbac.authorization.k8s.io/integration-service-componentgroup-editor-role created clusterrole.rbac.authorization.k8s.io/integration-service-componentgroup-viewer-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-admin-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-editor-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-viewer-role created clusterrole.rbac.authorization.k8s.io/integration-service-manager-role created clusterrole.rbac.authorization.k8s.io/integration-service-metrics-auth-role created clusterrole.rbac.authorization.k8s.io/integration-service-snapshot-garbage-collector created clusterrole.rbac.authorization.k8s.io/integration-service-tekton-editor-role created clusterrole.rbac.authorization.k8s.io/konflux-integration-runner created rolebinding.rbac.authorization.k8s.io/integration-service-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-metrics-auth-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-snapshot-garbage-collector created clusterrolebinding.rbac.authorization.k8s.io/integration-service-tekton-role-binding created clusterrolebinding.rbac.authorization.k8s.io/kyverno-background-controller-konflux-integration-runner created configmap/integration-service-manager-config created service/integration-service-controller-manager-metrics-service created service/integration-service-webhook-service created deployment.apps/integration-service-controller-manager created cronjob.batch/integration-service-snapshot-garbage-collector created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/serving-cert created issuer.cert-manager.io/selfsigned-issuer created clusterpolicy.kyverno.io/init-ns-integration created mutatingwebhookconfiguration.admissionregistration.k8s.io/integration-service-mutating-webhook-configuration created validatingwebhookconfiguration.admissionregistration.k8s.io/integration-service-validating-webhook-configuration created ๐Ÿ“‹ Setting up Namespace Lister... namespace/namespace-lister created serviceaccount/namespace-lister created clusterrole.rbac.authorization.k8s.io/namespace-lister-authorizer created clusterrolebinding.rbac.authorization.k8s.io/namespace-lister-authorizer created service/namespace-lister created deployment.apps/namespace-lister created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/namespace-lister created clusterpolicy.kyverno.io/deny-virtual-domain created networkpolicy.networking.k8s.io/namespace-lister-allow-from-konfluxui created networkpolicy.networking.k8s.io/namespace-lister-allow-to-apiserver created ๐ŸŽจ Deploying UI components... namespace/konflux-ui created serviceaccount/proxy created clusterrole.rbac.authorization.k8s.io/konflux-proxy created clusterrole.rbac.authorization.k8s.io/konflux-proxy-namespace-lister created clusterrolebinding.rbac.authorization.k8s.io/konflux-proxy created clusterrolebinding.rbac.authorization.k8s.io/konflux-proxy-namespace-lister created configmap/nginx-idp-location-h959ghd6bh created configmap/proxy-6bg85b98b7 created configmap/proxy-nginx-static-fmmfg7d22f created configmap/proxy-nginx-templates-4m8fgtf4m9 created secret/proxy created service/proxy created deployment.apps/proxy created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/serving-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Setting up OAuth2 proxy client secret... secret/oauth2-proxy-client-secret created Error from server (NotFound): secrets "oauth2-proxy-cookie-secret" not found ๐Ÿช Creating OAuth2 proxy cookie secret... secret/oauth2-proxy-cookie-secret created Waiting for Konflux to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/build-service-controller-manager condition met deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/integration-service-controller-manager condition met deployment.apps/registry condition met deployment.apps/proxy condition met deployment.apps/coredns condition met deployment.apps/metrics-server condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/namespace-lister condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/release-service-controller-manager condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met *************************** Konflux is up and running *************************** clusterrole.rbac.authorization.k8s.io/appstudio-pipelines-runner configured NAMESPACE NAME READY STATUS RESTARTS AGE build-service build-service-controller-manager-6cf97ff77f-26xjp 1/1 Running 0 108s cert-manager cert-manager-7459f86744-gcj2n 1/1 Running 0 7m2s cert-manager cert-manager-cainjector-55949d4888-fzs7m 1/1 Running 0 7m2s cert-manager cert-manager-webhook-68cbf75c9c-7xdc8 1/1 Running 0 7m1s cert-manager trust-manager-865b9c84ff-q6dlz 1/1 Running 0 6m47s dex dex-6f9ccf9454-dscsb 1/1 Running 1 (3m13s ago) 3m36s integration-service integration-service-controller-manager-f5668ffc8-mt7jz 1/1 Running 0 97s kind-registry registry-5b599f9d9d-dfc55 1/1 Running 0 3m34s konflux-ui proxy-6cb97c59c6-9744j 2/2 Running 0 91s kube-system coredns-575f7c7846-mcrgd 1/1 Running 0 11m kube-system coredns-575f7c7846-nhh4w 1/1 Running 0 11m kube-system coredns-575f7c7846-pqwsr 1/1 Running 0 11m kube-system etcd-kind-mapt-control-plane 1/1 Running 0 8m54s kube-system kindnet-pch5g 1/1 Running 0 11m kube-system kube-apiserver-kind-mapt-control-plane 1/1 Running 0 10m kube-system kube-controller-manager-kind-mapt-control-plane 1/1 Running 1 (9m16s ago) 8m54s kube-system kube-proxy-mk2mm 1/1 Running 0 11m kube-system kube-scheduler-kind-mapt-control-plane 1/1 Running 0 8m54s kube-system metrics-server-56ff78d5b7-q2glk 1/1 Running 0 11m kyverno kyverno-admission-controller-877795fc7-qdwvj 1/1 Running 0 2m51s kyverno kyverno-background-controller-5f9f9b856f-hxvmr 1/1 Running 0 2m51s local-path-storage local-path-provisioner-7dc846544d-n57pq 1/1 Running 0 11m namespace-lister namespace-lister-584d4574c4-s5nkc 1/1 Running 0 94s pipelines-as-code pipelines-as-code-controller-5cff8fdbb9-msjk2 1/1 Running 0 3m41s pipelines-as-code pipelines-as-code-watcher-6f9fd4cbb5-dvxrg 1/1 Running 0 3m40s pipelines-as-code pipelines-as-code-webhook-66c64db47f-cjhgv 1/1 Running 0 3m40s release-service release-service-controller-manager-5b46cd6ff8-r48lf 1/1 Running 0 119s smee-client gosmee-client-57688d9755-rp9jm 2/2 Running 0 2m59s tekton-operator tekton-operator-864c79545c-4kwlq 2/2 Running 0 6m22s tekton-operator tekton-operator-webhook-b678db645-sxk7k 1/1 Running 0 6m22s tekton-pipelines tekton-chains-controller-56b4589864-9fnsb 1/1 Running 0 3m47s tekton-pipelines tekton-chains-signing-secret-qfdjm 0/1 Completed 1 3m38s tekton-pipelines tekton-events-controller-f58b9fbcd-kb7q5 1/1 Running 0 5m55s tekton-pipelines tekton-operator-proxy-webhook-64c9b98f89-h65hh 1/1 Running 0 5m54s tekton-pipelines tekton-pipelines-controller-5dfff97774-2bg2x 1/1 Running 0 5m55s tekton-pipelines tekton-pipelines-remote-resolvers-7c567d6b77-t2qqk 1/1 Running 0 3m49s tekton-pipelines tekton-pipelines-webhook-65f6889cdf-67w6w 1/1 Running 0 5m54s tekton-pipelines tekton-results-api-546b75cb88-4tj7z 1/1 Running 0 5m6s tekton-pipelines tekton-results-postgres-0 1/1 Running 0 5m5s tekton-pipelines tekton-results-retention-policy-agent-68c6b7cf5d-mpxjj 1/1 Running 0 5m5s tekton-pipelines tekton-results-watcher-6c9b786b7-2d4n7 1/1 Running 0 5m5s tekton-pipelines tekton-triggers-controller-8444b7b678-6dvsj 1/1 Running 0 5m31s tekton-pipelines tekton-triggers-core-interceptors-7cc7cd5547-5t9jg 1/1 Running 0 5m31s tekton-pipelines tekton-triggers-webhook-f64478468-xtdcr 1/1 Running 0 5m31s [INFO] Reading required secrets... [INFO] Deploying image-controller... ๐Ÿ’ง Starting Image Controller deployment... ๐ŸŒŠ Deploying Image Controller components... namespace/image-controller created customresourcedefinition.apiextensions.k8s.io/imagerepositories.appstudio.redhat.com created serviceaccount/image-controller-controller-manager created role.rbac.authorization.k8s.io/image-controller-leader-election-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-editor-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-viewer-role created clusterrole.rbac.authorization.k8s.io/image-controller-manager-role created clusterrole.rbac.authorization.k8s.io/image-controller-metrics-auth-role created rolebinding.rbac.authorization.k8s.io/image-controller-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-metrics-auth-rolebinding created configmap/image-controller-image-pruner-configmap-tc4f9c8t66 created configmap/image-controller-notification-resetter-configmap-b2kb8hg596 created service/image-controller-controller-manager-metrics-service created deployment.apps/image-controller-controller-manager created cronjob.batch/image-controller-image-pruner-cronjob created cronjob.batch/image-controller-notification-resetter-cronjob created ๐Ÿ”‘ Setting up Quay credentials... ๐Ÿ”‘ Creating new Quay secret... secret/quaytoken created โณ Waiting for Image Controller to be ready... โณ Waiting for Image Controller pods to be ready... pod/image-controller-controller-manager-698566fd99-7ghwr condition met [INFO] Adding PaC secrets to pipelines-as-code... secret/pipelines-as-code-secret created secret/pipelines-as-code-secret created secret/pipelines-as-code-secret created [INFO] Deploying smee client... namespace/smee-client unchanged deployment.apps/gosmee-client configured โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/build-service-controller-manager condition met deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/image-controller-controller-manager condition met deployment.apps/integration-service-controller-manager condition met deployment.apps/registry condition met deployment.apps/proxy condition met deployment.apps/coredns condition met deployment.apps/metrics-server condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/namespace-lister condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/release-service-controller-manager condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met NAMESPACE NAME READY STATUS RESTARTS AGE build-service build-service-controller-manager-6cf97ff77f-26xjp 1/1 Running 0 2m15s cert-manager cert-manager-7459f86744-gcj2n 1/1 Running 0 7m29s cert-manager cert-manager-cainjector-55949d4888-fzs7m 1/1 Running 0 7m29s cert-manager cert-manager-webhook-68cbf75c9c-7xdc8 1/1 Running 0 7m28s cert-manager trust-manager-865b9c84ff-q6dlz 1/1 Running 0 7m14s dex dex-6f9ccf9454-dscsb 1/1 Running 1 (3m40s ago) 4m3s image-controller image-controller-controller-manager-698566fd99-7ghwr 1/1 Running 0 22s integration-service integration-service-controller-manager-f5668ffc8-mt7jz 1/1 Running 0 2m4s kind-registry registry-5b599f9d9d-dfc55 1/1 Running 0 4m1s konflux-ui proxy-6cb97c59c6-9744j 2/2 Running 0 118s kube-system coredns-575f7c7846-mcrgd 1/1 Running 0 11m kube-system coredns-575f7c7846-nhh4w 1/1 Running 0 11m kube-system coredns-575f7c7846-pqwsr 1/1 Running 0 11m kube-system etcd-kind-mapt-control-plane 1/1 Running 0 9m21s kube-system kindnet-pch5g 1/1 Running 0 12m kube-system kube-apiserver-kind-mapt-control-plane 1/1 Running 0 10m kube-system kube-controller-manager-kind-mapt-control-plane 1/1 Running 1 (9m43s ago) 9m21s kube-system kube-proxy-mk2mm 1/1 Running 0 12m kube-system kube-scheduler-kind-mapt-control-plane 1/1 Running 0 9m21s kube-system metrics-server-56ff78d5b7-q2glk 1/1 Running 0 11m kyverno kyverno-admission-controller-877795fc7-qdwvj 1/1 Running 0 3m18s kyverno kyverno-background-controller-5f9f9b856f-hxvmr 1/1 Running 0 3m18s local-path-storage local-path-provisioner-7dc846544d-n57pq 1/1 Running 0 12m namespace-lister namespace-lister-584d4574c4-s5nkc 1/1 Running 0 2m1s pipelines-as-code pipelines-as-code-controller-5cff8fdbb9-msjk2 1/1 Running 0 4m8s pipelines-as-code pipelines-as-code-watcher-6f9fd4cbb5-dvxrg 1/1 Running 0 4m7s pipelines-as-code pipelines-as-code-webhook-66c64db47f-cjhgv 1/1 Running 0 4m7s release-service release-service-controller-manager-5b46cd6ff8-r48lf 1/1 Running 0 2m26s smee-client gosmee-client-6669dc9b5-tn54h 2/2 Running 0 4s tekton-operator tekton-operator-864c79545c-4kwlq 2/2 Running 0 6m49s tekton-operator tekton-operator-webhook-b678db645-sxk7k 1/1 Running 0 6m49s tekton-pipelines tekton-chains-controller-56b4589864-9fnsb 1/1 Running 0 4m14s tekton-pipelines tekton-chains-signing-secret-qfdjm 0/1 Completed 1 4m5s tekton-pipelines tekton-events-controller-f58b9fbcd-kb7q5 1/1 Running 0 6m22s tekton-pipelines tekton-operator-proxy-webhook-64c9b98f89-h65hh 1/1 Running 0 6m21s tekton-pipelines tekton-pipelines-controller-5dfff97774-2bg2x 1/1 Running 0 6m22s tekton-pipelines tekton-pipelines-remote-resolvers-7c567d6b77-t2qqk 1/1 Running 0 4m16s tekton-pipelines tekton-pipelines-webhook-65f6889cdf-67w6w 1/1 Running 0 6m21s tekton-pipelines tekton-results-api-546b75cb88-4tj7z 1/1 Running 0 5m33s tekton-pipelines tekton-results-postgres-0 1/1 Running 0 5m32s tekton-pipelines tekton-results-retention-policy-agent-68c6b7cf5d-mpxjj 1/1 Running 0 5m32s tekton-pipelines tekton-results-watcher-6c9b786b7-2d4n7 1/1 Running 0 5m32s tekton-pipelines tekton-triggers-controller-8444b7b678-6dvsj 1/1 Running 0 5m58s tekton-pipelines tekton-triggers-core-interceptors-7cc7cd5547-5t9jg 1/1 Running 0 5m58s tekton-pipelines tekton-triggers-webhook-f64478468-xtdcr 1/1 Running 0 5m58s [INFO] Creating Test Resources... ๐Ÿงช Deploying test resources... ๐Ÿ‘ฅ Setting up demo users... namespace/user-ns1 created namespace/user-ns2 created serviceaccount/release-pipeline created Warning: resource serviceaccounts/default is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/default configured serviceaccount/release-pipeline created role.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created rolebinding.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator-binding created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created clusterrolebinding.rbac.authorization.k8s.io/managed1-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/managed2-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/user1-self-access-review created secret/regcred-empty created application.appstudio.redhat.com/sample-component created component.appstudio.redhat.com/sample-component created releaseplan.appstudio.redhat.com/local-release created releaseplan.appstudio.redhat.com/sample-component created integrationtestscenario.appstudio.redhat.com/sample-component-enterprise-contract created [INFO] Hardening Kyverno for high-throughput E2E workloads... [INFO] Waiting for kyverno-admission-controller deployment... deployment.apps/kyverno-admission-controller condition met [INFO] Scaling kyverno-admission-controller to 3 replicas with increased resources... deployment.apps/kyverno-admission-controller patched [INFO] Scaling kyverno-background-controller to 2 replicas... deployment.apps/kyverno-background-controller patched [INFO] Scaling kyverno-reports-controller to 0 replicas to reduce etcd churn... deployment.apps/kyverno-reports-controller scaled [INFO] Waiting for kyverno-admission-controller rollout... Waiting for deployment "kyverno-admission-controller" rollout to finish: 2 out of 3 new replicas have been updated... Waiting for deployment "kyverno-admission-controller" rollout to finish: 2 out of 3 new replicas have been updated... Waiting for deployment "kyverno-admission-controller" rollout to finish: 2 out of 3 new replicas have been updated... Waiting for deployment "kyverno-admission-controller" rollout to finish: 2 out of 3 new replicas have been updated... Waiting for deployment "kyverno-admission-controller" rollout to finish: 1 old replicas are pending termination... Waiting for deployment "kyverno-admission-controller" rollout to finish: 1 old replicas are pending termination... Waiting for deployment "kyverno-admission-controller" rollout to finish: 1 old replicas are pending termination... Waiting for deployment "kyverno-admission-controller" rollout to finish: 2 of 3 updated replicas are available... deployment "kyverno-admission-controller" successfully rolled out [INFO] Waiting for kyverno-background-controller rollout... deployment "kyverno-background-controller" successfully rolled out [INFO] Kyverno hardening complete. NAME READY STATUS RESTARTS AGE kyverno-admission-controller-6d7f57bd97-86kdw 1/1 Running 0 73s kyverno-admission-controller-6d7f57bd97-swt46 1/1 Running 0 74s kyverno-admission-controller-6d7f57bd97-vg6fj 1/1 Running 0 37s kyverno-background-controller-5f9f9b856f-hxvmr 1/1 Running 0 4m39s kyverno-background-controller-5f9f9b856f-lgr2c 1/1 Running 0 73s