[INFO] Fetching and executing solve-pr-pairing.sh... [INFO] Loading env vars from parameters [INFO] SOURCE_REPO_OWNER updated to: konflux-ci [INFO] Updating image repository to quay.io/redhat-user-workloads/rhtap-integration-tenant/integration-service/integration-service [INFO] Updating image tag to on-pr-c3e9bd832373c7141294a04b108d5a036310f5aa-linux-x86-64 [INFO] Updating GitHub reference to konflux-ci@c3e9bd832373c7141294a04b108d5a036310f5aa [INFO] kubernetes cluster is hosted on: https://35.162.53.137:6443 Kubernetes control plane is running at https://35.162.53.137:6443 CoreDNS is running at https://35.162.53.137:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [INFO] Installing Konflux CI dependencies ๐Ÿ” Checking requirements kubectl is installed openssl is installed Checking kubectl version kubectl version v1.35.0 meets minimum requirement (v1.31.4) All requirements are met Continue ๐Ÿงช Testing PVC creation for default storage class Creating PVC from './dependencies/pre-deployment-pvc-binding' using the cluster's default storage class namespace/test-pvc-ns created persistentvolumeclaim/test-pvc created pod/test-pvc-consumer created persistentvolumeclaim/test-pvc condition met namespace "test-pvc-ns" deleted persistentvolumeclaim "test-pvc" deleted from test-pvc-ns namespace pod "test-pvc-consumer" deleted from test-pvc-ns namespace PVC binding successfull ๐ŸŒŠ Deploying Konflux Dependencies ๐Ÿ” Deploying Cert Manager... namespace/cert-manager created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created serviceaccount/cert-manager created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager-startupapicheck created serviceaccount/cert-manager-webhook created role.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created rolebinding.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created service/cert-manager created service/cert-manager-cainjector created service/cert-manager-webhook created deployment.apps/cert-manager created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager-webhook created job.batch/cert-manager-startupapicheck created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met ๐Ÿค Deploying Trust Manager... customresourcedefinition.apiextensions.k8s.io/bundles.trust.cert-manager.io created serviceaccount/trust-manager created role.rbac.authorization.k8s.io/trust-manager created role.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/trust-manager created service/trust-manager created service/trust-manager-metrics created deployment.apps/trust-manager created certificate.cert-manager.io/trust-manager created issuer.cert-manager.io/trust-manager created validatingwebhookconfiguration.admissionregistration.k8s.io/trust-manager created pod/trust-manager-865b9c84ff-clxjh condition met ๐Ÿ“œ Setting up Cluster Issuer... Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/selfsigned-ca created clusterissuer.cert-manager.io/ca-issuer created clusterissuer.cert-manager.io/self-signed-cluster-issuer created ๐Ÿฑ Deploying Tekton... ๐Ÿฑ Installing Tekton Operator... namespace/tekton-operator created customresourcedefinition.apiextensions.k8s.io/manualapprovalgates.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonchains.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonconfigs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektondashboards.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonhubs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektoninstallersets.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpipelines.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpruners.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonresults.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektontriggers.operator.tekton.dev created serviceaccount/tekton-operator created role.rbac.authorization.k8s.io/tekton-operator-info created clusterrole.rbac.authorization.k8s.io/tekton-config-read-role created clusterrole.rbac.authorization.k8s.io/tekton-operator created clusterrole.rbac.authorization.k8s.io/tekton-result-read-role created rolebinding.rbac.authorization.k8s.io/tekton-operator-info created clusterrolebinding.rbac.authorization.k8s.io/tekton-config-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-operator created clusterrolebinding.rbac.authorization.k8s.io/tekton-result-read-rolebinding created configmap/config-logging created configmap/tekton-config-defaults created configmap/tekton-config-observability created configmap/tekton-operator-controller-config-leader-election created configmap/tekton-operator-info created configmap/tekton-operator-webhook-config-leader-election created secret/tekton-operator-webhook-certs created service/tekton-operator created service/tekton-operator-webhook created deployment.apps/tekton-operator created deployment.apps/tekton-operator-webhook created pod/tekton-operator-864c79545c-x9hcz condition met pod/tekton-operator-webhook-b678db645-zgwbg condition met tektonconfig.operator.tekton.dev/config condition met โš™๏ธ Configuring Tekton... Warning: resource tektonconfigs/config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. tektonconfig.operator.tekton.dev/config configured ๐Ÿ”„ Setting up Pipeline As Code... namespace/pipelines-as-code created customresourcedefinition.apiextensions.k8s.io/repositories.pipelinesascode.tekton.dev created serviceaccount/pipelines-as-code-controller created serviceaccount/pipelines-as-code-watcher created serviceaccount/pipelines-as-code-webhook created role.rbac.authorization.k8s.io/pipelines-as-code-controller-role created role.rbac.authorization.k8s.io/pipelines-as-code-info created role.rbac.authorization.k8s.io/pipelines-as-code-watcher-role created role.rbac.authorization.k8s.io/pipelines-as-code-webhook-role created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-controller-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-watcher-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-webhook-clusterrole created clusterrole.rbac.authorization.k8s.io/pipelines-as-code-aggregate created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-info created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-binding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-clusterbinding created configmap/pac-config-logging created configmap/pac-watcher-config-leader-election created configmap/pac-webhook-config-leader-election created configmap/pipelines-as-code created configmap/pipelines-as-code-config-observability created configmap/pipelines-as-code-info created secret/pipelines-as-code-webhook-certs created service/pipelines-as-code-controller created service/pipelines-as-code-watcher created service/pipelines-as-code-webhook created deployment.apps/pipelines-as-code-controller created deployment.apps/pipelines-as-code-watcher created deployment.apps/pipelines-as-code-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.pipelinesascode.tekton.dev created error: timed out waiting for the condition on tektonconfigs/config [INFO] Reading required secrets... [INFO] Deploying image-controller... ๐Ÿ’ง Starting Image Controller deployment... ๐ŸŒŠ Deploying Image Controller components... namespace/image-controller created customresourcedefinition.apiextensions.k8s.io/imagerepositories.appstudio.redhat.com created serviceaccount/image-controller-controller-manager created role.rbac.authorization.k8s.io/image-controller-leader-election-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-editor-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-viewer-role created clusterrole.rbac.authorization.k8s.io/image-controller-manager-role created clusterrole.rbac.authorization.k8s.io/image-controller-metrics-auth-role created rolebinding.rbac.authorization.k8s.io/image-controller-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-metrics-auth-rolebinding created configmap/image-controller-image-pruner-configmap-tc4f9c8t66 created configmap/image-controller-notification-resetter-configmap-b2kb8hg596 created service/image-controller-controller-manager-metrics-service created deployment.apps/image-controller-controller-manager created cronjob.batch/image-controller-image-pruner-cronjob created cronjob.batch/image-controller-notification-resetter-cronjob created ๐Ÿ”‘ Setting up Quay credentials... ๐Ÿ”‘ Creating new Quay secret... secret/quaytoken created โณ Waiting for Image Controller to be ready... โณ Waiting for Image Controller pods to be ready... pod/image-controller-controller-manager-698566fd99-mmflg condition met [INFO] Adding PaC secrets to pipelines-as-code... secret/pipelines-as-code-secret created error: failed to create secret namespaces "build-service" not found [INFO] Creating Test Resources... ๐Ÿงช Deploying test resources... ๐Ÿ‘ฅ Setting up demo users... namespace/user-ns1 created namespace/user-ns2 created serviceaccount/release-pipeline created Warning: resource serviceaccounts/default is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/default configured serviceaccount/release-pipeline created role.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created rolebinding.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator-binding created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created clusterrolebinding.rbac.authorization.k8s.io/managed1-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/managed2-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/user1-self-access-review created secret/regcred-empty created resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "Application" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "Component" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "local-release" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component-enterprise-contract" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "IntegrationTestScenario" in version "appstudio.redhat.com/v1beta2" ensure CRDs are installed first