[INFO] Fetching and executing solve-pr-pairing.sh... [INFO] Looking for paired PR in konflux-ci/release-service for 'release-service-catalog' [INFO] No paired PR found in konflux-ci/release-service by null on branch refs/heads/staging [INFO] Checking for paired PR in redhat-appstudio/infra-deployments [INFO] No paired PR found in redhat-appstudio/infra-deployments. Falling back to branch: main [INFO] Downloading release_service_config.yaml... [INFO] Downloaded release-service-config.yaml [INFO] Downloading release-pipeline-resources-clusterrole.yaml... [INFO] Downloaded release-pipeline-resources-clusterrole.yaml [INFO] Configuration files updated. [INFO] Loading env vars from parameters [WARNING] No substitutions will be applied as the kustomization file for release-service-catalog has not been found. Kubernetes control plane is running at https://13.127.236.223:6443 CoreDNS is running at https://13.127.236.223:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [INFO] Installing Konflux CI dependencies ๐Ÿ” Checking requirements kubectl is installed openssl is installed All requirements are met Continue ๐Ÿงช Testing PVC creation for default storage class Creating PVC from './dependencies/pre-deployment-pvc-binding' using the cluster's default storage class namespace/test-pvc-ns created persistentvolumeclaim/test-pvc created pod/test-pvc-consumer created persistentvolumeclaim/test-pvc condition met namespace "test-pvc-ns" deleted persistentvolumeclaim "test-pvc" deleted from test-pvc-ns namespace pod "test-pvc-consumer" deleted from test-pvc-ns namespace PVC binding successfull ๐ŸŒŠ Deploying Konflux Dependencies ๐Ÿ” Deploying Cert Manager... namespace/cert-manager created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created serviceaccount/cert-manager created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager-webhook created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created pod/cert-manager-66d46f75d6-wtmln condition met pod/cert-manager-cainjector-856bdc4b95-nk6zp condition met pod/cert-manager-webhook-7fdfc5cd79-jw2ks condition met ๐Ÿค Deploying Trust Manager... customresourcedefinition.apiextensions.k8s.io/bundles.trust.cert-manager.io created serviceaccount/trust-manager created role.rbac.authorization.k8s.io/trust-manager created role.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/trust-manager created service/trust-manager created service/trust-manager-metrics created deployment.apps/trust-manager created certificate.cert-manager.io/trust-manager created issuer.cert-manager.io/trust-manager created validatingwebhookconfiguration.admissionregistration.k8s.io/trust-manager created pod/trust-manager-7c9f8b8f7d-zd8wl condition met ๐Ÿ“œ Setting up Cluster Issuer... certificate.cert-manager.io/selfsigned-ca created clusterissuer.cert-manager.io/ca-issuer created clusterissuer.cert-manager.io/self-signed-cluster-issuer created ๐Ÿฑ Deploying Tekton... ๐Ÿฑ Installing Tekton Operator... namespace/tekton-operator created customresourcedefinition.apiextensions.k8s.io/manualapprovalgates.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonchains.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonconfigs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektondashboards.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonhubs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektoninstallersets.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpipelines.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpruners.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonresults.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektontriggers.operator.tekton.dev created serviceaccount/tekton-operator created role.rbac.authorization.k8s.io/tekton-operator-info created clusterrole.rbac.authorization.k8s.io/tekton-config-read-role created clusterrole.rbac.authorization.k8s.io/tekton-operator created clusterrole.rbac.authorization.k8s.io/tekton-result-read-role created rolebinding.rbac.authorization.k8s.io/tekton-operator-info created clusterrolebinding.rbac.authorization.k8s.io/tekton-config-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-operator created clusterrolebinding.rbac.authorization.k8s.io/tekton-result-read-rolebinding created configmap/config-logging created configmap/tekton-config-defaults created configmap/tekton-config-observability created configmap/tekton-operator-controller-config-leader-election created configmap/tekton-operator-info created configmap/tekton-operator-webhook-config-leader-election created secret/tekton-operator-webhook-certs created service/tekton-operator created service/tekton-operator-webhook created deployment.apps/tekton-operator created deployment.apps/tekton-operator-webhook created pod/tekton-operator-6b9545955d-lb2tn condition met pod/tekton-operator-webhook-686c475875-q77jn condition met tektonconfig.operator.tekton.dev/config condition met โš™๏ธ Configuring Tekton... Warning: resource tektonconfigs/config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. tektonconfig.operator.tekton.dev/config configured ๐Ÿ”„ Setting up Pipeline As Code... namespace/pipelines-as-code created customresourcedefinition.apiextensions.k8s.io/repositories.pipelinesascode.tekton.dev created serviceaccount/pipelines-as-code-controller created serviceaccount/pipelines-as-code-watcher created serviceaccount/pipelines-as-code-webhook created role.rbac.authorization.k8s.io/pipelines-as-code-controller-role created role.rbac.authorization.k8s.io/pipelines-as-code-info created role.rbac.authorization.k8s.io/pipelines-as-code-watcher-role created role.rbac.authorization.k8s.io/pipelines-as-code-webhook-role created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-controller-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-watcher-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-webhook-clusterrole created clusterrole.rbac.authorization.k8s.io/pipelines-as-code-aggregate created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-info created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-binding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-clusterbinding created configmap/pac-config-logging created configmap/pac-watcher-config-leader-election created configmap/pac-webhook-config-leader-election created configmap/pipelines-as-code created configmap/pipelines-as-code-config-observability created configmap/pipelines-as-code-info created secret/pipelines-as-code-webhook-certs created service/pipelines-as-code-controller created service/pipelines-as-code-watcher created service/pipelines-as-code-webhook created deployment.apps/pipelines-as-code-controller created deployment.apps/pipelines-as-code-watcher created deployment.apps/pipelines-as-code-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.pipelinesascode.tekton.dev created tektonconfig.operator.tekton.dev/config condition met ๐Ÿ“Š Setting up Tekton Results... NAME TYPE DATA AGE tekton-results-postgres Opaque 2 96s Warning: resource serviceaccounts/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/tekton-results-api configured Warning: resource serviceaccounts/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/tekton-results-watcher configured Warning: resource roles/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. role.rbac.authorization.k8s.io/tekton-results-info configured Warning: resource clusterroles/tekton-results-admin is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-admin configured Warning: resource clusterroles/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-api configured Warning: resource clusterroles/tekton-results-readonly is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-readonly configured Warning: resource clusterroles/tekton-results-readwrite is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-readwrite configured Warning: resource clusterroles/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-watcher configured Warning: resource rolebindings/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. rolebinding.rbac.authorization.k8s.io/tekton-results-info configured Warning: resource clusterrolebindings/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrolebinding.rbac.authorization.k8s.io/tekton-results-api configured Warning: resource clusterrolebindings/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrolebinding.rbac.authorization.k8s.io/tekton-results-watcher configured Warning: resource configmaps/tekton-results-api-config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-api-config configured Warning: resource configmaps/tekton-results-config-leader-election is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-leader-election configured Warning: resource configmaps/tekton-results-config-logging is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-logging configured Warning: resource configmaps/tekton-results-config-observability is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-observability configured Warning: resource configmaps/tekton-results-config-results-retention-policy is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-results-retention-policy configured Warning: resource configmaps/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-info configured Warning: resource configmaps/tekton-results-postgres is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-postgres configured Warning: resource services/tekton-results-api-service is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-api-service configured Warning: resource services/tekton-results-postgres-service is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-postgres-service configured Warning: resource services/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-watcher configured Warning: resource deployments/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-api configured Warning: resource deployments/tekton-results-retention-policy-agent is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-retention-policy-agent configured Warning: resource deployments/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-watcher configured Warning: resource statefulsets/tekton-results-postgres is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. statefulset.apps/tekton-results-postgres configured certificate.cert-manager.io/serving-cert created ๐Ÿ”‘ Deploying Dex... namespace/dex created serviceaccount/dex created clusterrole.rbac.authorization.k8s.io/dex created clusterrolebinding.rbac.authorization.k8s.io/dex created configmap/dex-4k6bdhgm54 created service/dex created deployment.apps/dex created certificate.cert-manager.io/dex-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Creating secret oauth2-proxy-client-secret secret/oauth2-proxy-client-secret created ๐Ÿ“ฆ Deploying Registry... namespace/kind-registry created service/registry-service created deployment.apps/registry created certificate.cert-manager.io/registry-cert created bundle.trust.cert-manager.io/trusted-ca created pod/registry-68dcdc78fb-qt2vl condition met ๐Ÿ”„ Deploying Smee... Randomizing smee-channel ID namespace/smee-client created deployment.apps/gosmee-client created ๐Ÿ›ก๏ธ Deploying Kyverno... namespace/kyverno serverside-applied customresourcedefinition.apiextensions.k8s.io/cleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clustercleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/deletingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/ephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/generatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/globalcontextentries.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/imagevalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/mutatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/updaterequests.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/validatingpolicies.policies.kyverno.io serverside-applied serviceaccount/kyverno-admission-controller serverside-applied serviceaccount/kyverno-background-controller serverside-applied serviceaccount/kyverno-cleanup-controller serverside-applied serviceaccount/kyverno-reports-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno-manage-resources serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller:core serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller:view serverside-applied configmap/kyverno serverside-applied configmap/kyverno-metrics serverside-applied service/kyverno-background-controller-metrics serverside-applied service/kyverno-cleanup-controller serverside-applied service/kyverno-cleanup-controller-metrics serverside-applied service/kyverno-reports-controller-metrics serverside-applied service/kyverno-svc serverside-applied service/kyverno-svc-metrics serverside-applied deployment.apps/kyverno-admission-controller serverside-applied deployment.apps/kyverno-background-controller serverside-applied deployment.apps/kyverno-cleanup-controller serverside-applied deployment.apps/kyverno-reports-controller serverside-applied clusterpolicy.kyverno.io/reduce-tekton-pr-taskrun-resource-requests created โณ Waiting for the dependencies to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met [INFO] Installing Konflux CI... Deploying Konflux ๐Ÿš€ Deploying Application API CRDs... error: accumulating resources: accumulation err='accumulating resources from 'https://github.com/redhat-appstudio/application-api/config/crd?ref=5a9670bf76794f54fdd21009a2a0920c0db0811f': URL is a git repository': failed to run '/usr/bin/git fetch --depth=1 https://github.com/redhat-appstudio/application-api 5a9670bf76794f54fdd21009a2a0920c0db0811f': fatal: unable to access 'https://github.com/redhat-appstudio/application-api/': Could not resolve host: github.com : exit status 128 [INFO] Applying Kyverno to reduce resources for testing clusterpolicy.kyverno.io/e2e-reduce-resources created [INFO] Creating Test Resources... ๐Ÿงช Deploying test resources... ๐Ÿ‘ฅ Setting up demo users... namespace/user-ns1 created namespace/user-ns2 created serviceaccount/appstudio-pipeline created serviceaccount/appstudio-pipeline created role.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created rolebinding.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator-binding created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created clusterrolebinding.rbac.authorization.k8s.io/managed1-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/managed2-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/user1-self-access-review created secret/regcred-empty created resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "Application" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "Component" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "local-release" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component-enterprise-contract" namespace: "user-ns1" from "./test/resources/demo-users/user/": no matches for kind "IntegrationTestScenario" in version "appstudio.redhat.com/v1beta2" ensure CRDs are installed first