[INFO] Fetching and executing solve-pr-pairing.sh... [INFO] Looking for paired PR in konflux-ci/release-service for 'release-service-catalog' [INFO] No paired PR found in konflux-ci/release-service by on branch refs/heads/staging [INFO] Checking for paired PR in redhat-appstudio/infra-deployments [INFO] No paired PR found in redhat-appstudio/infra-deployments. Falling back to branch: main [INFO] Downloading release_service_config.yaml... [INFO] Downloaded release-service-config.yaml [INFO] Downloading release-pipeline-resources-clusterrole.yaml... [INFO] Downloaded release-pipeline-resources-clusterrole.yaml [INFO] Configuration files updated. [INFO] Loading env vars from parameters [WARNING] No substitutions will be applied as the kustomization file for release-service-catalog has not been found. Kubernetes control plane is running at https://65.1.162.46:6443 CoreDNS is running at https://65.1.162.46:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [INFO] Installing Konflux CI dependencies ๐Ÿ” Checking requirements kubectl is installed openssl is installed All requirements are met Continue ๐Ÿงช Testing PVC creation for default storage class Creating PVC from './dependencies/pre-deployment-pvc-binding' using the cluster's default storage class namespace/test-pvc-ns created persistentvolumeclaim/test-pvc created pod/test-pvc-consumer created persistentvolumeclaim/test-pvc condition met namespace "test-pvc-ns" deleted persistentvolumeclaim "test-pvc" deleted pod "test-pvc-consumer" deleted PVC binding successfull ๐ŸŒŠ Deploying Konflux Dependencies ๐Ÿ” Deploying Cert Manager... namespace/cert-manager created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created serviceaccount/cert-manager created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager-webhook created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created pod/cert-manager-66d46f75d6-4rhzk condition met pod/cert-manager-cainjector-856bdc4b95-cffqg condition met pod/cert-manager-webhook-7fdfc5cd79-t4qw8 condition met ๐Ÿค Deploying Trust Manager... customresourcedefinition.apiextensions.k8s.io/bundles.trust.cert-manager.io created serviceaccount/trust-manager created role.rbac.authorization.k8s.io/trust-manager created role.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/trust-manager created service/trust-manager created service/trust-manager-metrics created deployment.apps/trust-manager created certificate.cert-manager.io/trust-manager created issuer.cert-manager.io/trust-manager created validatingwebhookconfiguration.admissionregistration.k8s.io/trust-manager created pod/trust-manager-7c9f8b8f7d-fpm5b condition met ๐Ÿ“œ Setting up Cluster Issuer... certificate.cert-manager.io/selfsigned-ca created clusterissuer.cert-manager.io/ca-issuer created clusterissuer.cert-manager.io/self-signed-cluster-issuer created ๐Ÿฑ Deploying Tekton... ๐Ÿฑ Installing Tekton Operator... namespace/tekton-operator created customresourcedefinition.apiextensions.k8s.io/manualapprovalgates.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonchains.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonconfigs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektondashboards.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonhubs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektoninstallersets.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpipelines.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonresults.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektontriggers.operator.tekton.dev created serviceaccount/tekton-operator created role.rbac.authorization.k8s.io/tekton-operator-info created clusterrole.rbac.authorization.k8s.io/tekton-config-read-role created clusterrole.rbac.authorization.k8s.io/tekton-operator created clusterrole.rbac.authorization.k8s.io/tekton-result-read-role created rolebinding.rbac.authorization.k8s.io/tekton-operator-info created clusterrolebinding.rbac.authorization.k8s.io/tekton-config-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-operator created clusterrolebinding.rbac.authorization.k8s.io/tekton-result-read-rolebinding created configmap/config-logging created configmap/tekton-config-defaults created configmap/tekton-config-observability created configmap/tekton-operator-controller-config-leader-election created configmap/tekton-operator-info created configmap/tekton-operator-webhook-config-leader-election created secret/tekton-operator-webhook-certs created service/tekton-operator created service/tekton-operator-webhook created deployment.apps/tekton-operator created deployment.apps/tekton-operator-webhook created pod/tekton-operator-596b885757-c8ck9 condition met pod/tekton-operator-webhook-85dd8445c9-ppqpt condition met tektonconfig.operator.tekton.dev/config condition met โš™๏ธ Configuring Tekton... Warning: resource tektonconfigs/config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. tektonconfig.operator.tekton.dev/config configured ๐Ÿ”„ Setting up Pipeline As Code... namespace/pipelines-as-code created customresourcedefinition.apiextensions.k8s.io/repositories.pipelinesascode.tekton.dev created serviceaccount/pipelines-as-code-controller created serviceaccount/pipelines-as-code-watcher created serviceaccount/pipelines-as-code-webhook created role.rbac.authorization.k8s.io/pipelines-as-code-controller-role created role.rbac.authorization.k8s.io/pipelines-as-code-info created role.rbac.authorization.k8s.io/pipelines-as-code-watcher-role created role.rbac.authorization.k8s.io/pipelines-as-code-webhook-role created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-controller-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-watcher-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-webhook-clusterrole created clusterrole.rbac.authorization.k8s.io/pipelines-as-code-aggregate created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-info created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-binding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-clusterbinding created configmap/pac-config-logging created configmap/pac-watcher-config-leader-election created configmap/pac-webhook-config-leader-election created configmap/pipelines-as-code created configmap/pipelines-as-code-config-observability created configmap/pipelines-as-code-info created secret/pipelines-as-code-webhook-certs created service/pipelines-as-code-controller created service/pipelines-as-code-watcher created service/pipelines-as-code-webhook created deployment.apps/pipelines-as-code-controller created deployment.apps/pipelines-as-code-watcher created deployment.apps/pipelines-as-code-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.pipelinesascode.tekton.dev created tektonconfig.operator.tekton.dev/config condition met ๐Ÿ“Š Setting up Tekton Results... NAME TYPE DATA AGE tekton-results-postgres Opaque 2 84s Warning: resource serviceaccounts/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/tekton-results-api configured Warning: resource serviceaccounts/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. serviceaccount/tekton-results-watcher configured Warning: resource roles/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. role.rbac.authorization.k8s.io/tekton-results-info configured Warning: resource clusterroles/tekton-results-admin is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-admin configured Warning: resource clusterroles/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-api configured Warning: resource clusterroles/tekton-results-readonly is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-readonly configured Warning: resource clusterroles/tekton-results-readwrite is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-readwrite configured Warning: resource clusterroles/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrole.rbac.authorization.k8s.io/tekton-results-watcher configured Warning: resource rolebindings/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. rolebinding.rbac.authorization.k8s.io/tekton-results-info configured Warning: resource clusterrolebindings/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrolebinding.rbac.authorization.k8s.io/tekton-results-api configured Warning: resource clusterrolebindings/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. clusterrolebinding.rbac.authorization.k8s.io/tekton-results-watcher configured Warning: resource configmaps/tekton-results-api-config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-api-config configured Warning: resource configmaps/tekton-results-config-leader-election is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-leader-election configured Warning: resource configmaps/tekton-results-config-logging is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-logging configured Warning: resource configmaps/tekton-results-config-observability is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-observability configured Warning: resource configmaps/tekton-results-config-results-retention-policy is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-config-results-retention-policy configured Warning: resource configmaps/tekton-results-info is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-info configured Warning: resource configmaps/tekton-results-postgres is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. configmap/tekton-results-postgres configured Warning: resource services/tekton-results-api-service is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-api-service configured Warning: resource services/tekton-results-postgres-service is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-postgres-service configured Warning: resource services/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. service/tekton-results-watcher configured Warning: resource deployments/tekton-results-api is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-api configured Warning: resource deployments/tekton-results-retention-policy-agent is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-retention-policy-agent configured Warning: resource deployments/tekton-results-watcher is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. deployment.apps/tekton-results-watcher configured Warning: resource statefulsets/tekton-results-postgres is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. statefulset.apps/tekton-results-postgres configured certificate.cert-manager.io/serving-cert created ๐Ÿ”‘ Deploying Dex... namespace/dex created serviceaccount/dex created clusterrole.rbac.authorization.k8s.io/dex created clusterrolebinding.rbac.authorization.k8s.io/dex created configmap/dex-4k6bdhgm54 created service/dex created deployment.apps/dex created certificate.cert-manager.io/dex-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Creating secret oauth2-proxy-client-secret secret/oauth2-proxy-client-secret created ๐Ÿ“ฆ Deploying Registry... namespace/kind-registry created service/registry-service created deployment.apps/registry created certificate.cert-manager.io/registry-cert created bundle.trust.cert-manager.io/trusted-ca created pod/registry-68dcdc78fb-ftvvr condition met ๐Ÿ”„ Deploying Smee... Randomizing smee-channel ID namespace/smee-client created deployment.apps/gosmee-client created ๐Ÿ›ก๏ธ Deploying Kyverno... namespace/kyverno serverside-applied customresourcedefinition.apiextensions.k8s.io/admissionreports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/backgroundscanreports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/cleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusteradmissionreports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterbackgroundscanreports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clustercleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/updaterequests.kyverno.io serverside-applied serviceaccount/kyverno-admission-controller serverside-applied serviceaccount/kyverno-background-controller serverside-applied serviceaccount/kyverno-cleanup-controller serverside-applied serviceaccount/kyverno-cleanup-jobs serverside-applied serviceaccount/kyverno-reports-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno-cleanup-jobs serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller:core serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno-cleanup-jobs serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied configmap/kyverno serverside-applied configmap/kyverno-metrics serverside-applied service/kyverno-background-controller-metrics serverside-applied service/kyverno-cleanup-controller serverside-applied service/kyverno-cleanup-controller-metrics serverside-applied service/kyverno-reports-controller-metrics serverside-applied service/kyverno-svc serverside-applied service/kyverno-svc-metrics serverside-applied deployment.apps/kyverno-admission-controller serverside-applied deployment.apps/kyverno-background-controller serverside-applied deployment.apps/kyverno-cleanup-controller serverside-applied deployment.apps/kyverno-reports-controller serverside-applied cronjob.batch/kyverno-cleanup-admission-reports serverside-applied cronjob.batch/kyverno-cleanup-cluster-admission-reports serverside-applied clusterpolicy.kyverno.io/remove-tekton-taskrun-resource-requests created โณ Waiting for the dependencies to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met [INFO] Installing Konflux CI... Deploying Konflux ๐Ÿš€ Deploying Application API CRDs... customresourcedefinition.apiextensions.k8s.io/applications.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/componentdetectionqueries.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/components.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclaims.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclasses.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargets.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/environments.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/promotionruns.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshotenvironmentbindings.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshots.appstudio.redhat.com created ๐Ÿ‘ฅ Setting up RBAC permissions... namespace/openshift-pipelines created serviceaccount/chains-secrets-admin created role.rbac.authorization.k8s.io/chains-secret-admin created role.rbac.authorization.k8s.io/chains-secret-admin created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-self-access-reviewer created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions created clusterrole.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created job.batch/tekton-chains-signing-secret created ๐Ÿ“œ Deploying Enterprise Contract... namespace/enterprise-contract-service created customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role created rolebinding.rbac.authorization.k8s.io/public-ec-cm created rolebinding.rbac.authorization.k8s.io/public-ecp created configmap/ec-defaults created resource mapping not found for name: "all" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "default" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-no-hermetic" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-trusted-tasks" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "slsa3" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first ๐Ÿ”„ Retrying command (attempt 2/3)... namespace/enterprise-contract-service unchanged customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role unchanged rolebinding.rbac.authorization.k8s.io/public-ec-cm unchanged rolebinding.rbac.authorization.k8s.io/public-ecp unchanged configmap/ec-defaults unchanged enterprisecontractpolicy.appstudio.redhat.com/all created enterprisecontractpolicy.appstudio.redhat.com/default created enterprisecontractpolicy.appstudio.redhat.com/redhat created enterprisecontractpolicy.appstudio.redhat.com/redhat-no-hermetic created enterprisecontractpolicy.appstudio.redhat.com/redhat-trusted-tasks created enterprisecontractpolicy.appstudio.redhat.com/slsa3 created ๐ŸŽฏ Deploying Release Service... namespace/release-service serverside-applied customresourcedefinition.apiextensions.k8s.io/internalrequests.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/internalservicesconfigs.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplanadmissions.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplans.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releases.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseserviceconfigs.appstudio.redhat.com serverside-applied serviceaccount/release-service-controller-manager serverside-applied role.rbac.authorization.k8s.io/release-service-leader-election-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-pipeline-resource-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-application-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-component-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-environment-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-manager-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-metrics-auth-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-tekton-role serverside-applied clusterrole.rbac.authorization.k8s.io/releaseserviceconfig-role serverside-applied rolebinding.rbac.authorization.k8s.io/release-service-leader-election-rolebinding serverside-applied rolebinding.rbac.authorization.k8s.io/releaseserviceconfigs-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-application-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-component-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-environment-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-manager-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-metrics-auth-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-release-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplan-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplanadmission-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshot-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-tekton-role-binding serverside-applied configmap/release-service-manager-config serverside-applied configmap/release-service-manager-properties serverside-applied service/release-service-controller-manager-metrics-service serverside-applied service/release-service-webhook-service serverside-applied deployment.apps/release-service-controller-manager serverside-applied certificate.cert-manager.io/serving-cert serverside-applied issuer.cert-manager.io/selfsigned-issuer serverside-applied mutatingwebhookconfiguration.admissionregistration.k8s.io/release-service-mutating-webhook-configuration serverside-applied validatingwebhookconfiguration.admissionregistration.k8s.io/release-service-validating-webhook-configuration serverside-applied error: resource mapping not found for name: "release-service-config" namespace: "release-service" from "./konflux-ci/release": no matches for kind "ReleaseServiceConfig" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first ๐Ÿ”„ Retrying command (attempt 2/3)... namespace/release-service serverside-applied customresourcedefinition.apiextensions.k8s.io/internalrequests.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/internalservicesconfigs.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplanadmissions.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseplans.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releases.appstudio.redhat.com serverside-applied customresourcedefinition.apiextensions.k8s.io/releaseserviceconfigs.appstudio.redhat.com serverside-applied serviceaccount/release-service-controller-manager serverside-applied role.rbac.authorization.k8s.io/release-service-leader-election-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-pipeline-resource-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-application-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-component-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-environment-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-manager-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-metrics-auth-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-release-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplan-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-releaseplanadmission-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshot-viewer-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-editor-role serverside-applied clusterrole.rbac.authorization.k8s.io/release-service-tekton-role serverside-applied clusterrole.rbac.authorization.k8s.io/releaseserviceconfig-role serverside-applied rolebinding.rbac.authorization.k8s.io/release-service-leader-election-rolebinding serverside-applied rolebinding.rbac.authorization.k8s.io/releaseserviceconfigs-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-application-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-component-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-environment-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-manager-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-metrics-auth-rolebinding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-release-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplan-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-releaseplanadmission-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshot-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-snapshotenvironmentbinding-role-binding serverside-applied clusterrolebinding.rbac.authorization.k8s.io/release-service-tekton-role-binding serverside-applied configmap/release-service-manager-config serverside-applied configmap/release-service-manager-properties serverside-applied service/release-service-controller-manager-metrics-service serverside-applied service/release-service-webhook-service serverside-applied deployment.apps/release-service-controller-manager serverside-applied releaseserviceconfig.appstudio.redhat.com/release-service-config serverside-applied certificate.cert-manager.io/serving-cert serverside-applied issuer.cert-manager.io/selfsigned-issuer serverside-applied mutatingwebhookconfiguration.admissionregistration.k8s.io/release-service-mutating-webhook-configuration serverside-applied validatingwebhookconfiguration.admissionregistration.k8s.io/release-service-validating-webhook-configuration serverside-applied ๐Ÿ—๏ธ Deploying Build Service... namespace/build-service created serviceaccount/build-service-controller-manager created role.rbac.authorization.k8s.io/build-service-build-pipeline-config-read-only created role.rbac.authorization.k8s.io/build-service-leader-election-role created clusterrole.rbac.authorization.k8s.io/appstudio-pipelines-runner created clusterrole.rbac.authorization.k8s.io/build-service-manager-role created clusterrole.rbac.authorization.k8s.io/build-service-metrics-auth-role created rolebinding.rbac.authorization.k8s.io/build-pipeline-config-read-only-binding created rolebinding.rbac.authorization.k8s.io/build-service-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-pipeline-runner-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-service-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/build-service-metrics-auth-rolebinding created configmap/build-pipeline-config created service/build-service-controller-manager-metrics-service created deployment.apps/build-service-controller-manager created ๐Ÿ”„ Deploying Integration Service... namespace/integration-service created customresourcedefinition.apiextensions.k8s.io/integrationtestscenarios.appstudio.redhat.com created serviceaccount/integration-service-controller-manager created serviceaccount/integration-service-snapshot-garbage-collector created role.rbac.authorization.k8s.io/integration-service-leader-election-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-admin-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-editor-role created clusterrole.rbac.authorization.k8s.io/integration-service-integrationtestscenario-viewer-role created clusterrole.rbac.authorization.k8s.io/integration-service-manager-role created clusterrole.rbac.authorization.k8s.io/integration-service-metrics-auth-role created clusterrole.rbac.authorization.k8s.io/integration-service-snapshot-garbage-collector created clusterrole.rbac.authorization.k8s.io/integration-service-tekton-editor-role created clusterrole.rbac.authorization.k8s.io/konflux-integration-runner created rolebinding.rbac.authorization.k8s.io/integration-service-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-metrics-auth-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/integration-service-snapshot-garbage-collector created clusterrolebinding.rbac.authorization.k8s.io/integration-service-tekton-role-binding created configmap/integration-service-manager-config created service/integration-service-controller-manager-metrics-service created service/integration-service-webhook-service created deployment.apps/integration-service-controller-manager created cronjob.batch/integration-service-snapshot-garbage-collector created certificate.cert-manager.io/serving-cert created issuer.cert-manager.io/selfsigned-issuer created mutatingwebhookconfiguration.admissionregistration.k8s.io/integration-service-mutating-webhook-configuration created validatingwebhookconfiguration.admissionregistration.k8s.io/integration-service-validating-webhook-configuration created ๐Ÿ“‹ Setting up Namespace Lister... namespace/namespace-lister created serviceaccount/namespace-lister created clusterrole.rbac.authorization.k8s.io/namespace-lister-authorizer created clusterrolebinding.rbac.authorization.k8s.io/namespace-lister-authorizer created service/namespace-lister created deployment.apps/namespace-lister created certificate.cert-manager.io/namespace-lister created networkpolicy.networking.k8s.io/namespace-lister-allow-from-konfluxui created networkpolicy.networking.k8s.io/namespace-lister-allow-to-apiserver created ๐ŸŽจ Deploying UI components... namespace/konflux-ui created serviceaccount/proxy created clusterrole.rbac.authorization.k8s.io/konflux-proxy created clusterrole.rbac.authorization.k8s.io/konflux-proxy-namespace-lister created clusterrolebinding.rbac.authorization.k8s.io/konflux-proxy created clusterrolebinding.rbac.authorization.k8s.io/konflux-proxy-namespace-lister created configmap/nginx-idp-location-h959ghd6bh created configmap/proxy-cb8kd95k47 created configmap/proxy-nginx-static-fmmfg7d22f created configmap/proxy-nginx-templates-4m8fgtf4m9 created secret/proxy created service/proxy created deployment.apps/proxy created certificate.cert-manager.io/serving-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Setting up OAuth2 proxy client secret... secret/oauth2-proxy-client-secret created Error from server (NotFound): secrets "oauth2-proxy-cookie-secret" not found ๐Ÿช Creating OAuth2 proxy cookie secret... secret/oauth2-proxy-cookie-secret created Waiting for Konflux to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/build-service-controller-manager condition met deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/integration-service-controller-manager condition met deployment.apps/registry condition met deployment.apps/proxy condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/namespace-lister condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/release-service-controller-manager condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met *************************** Konflux is up and running *************************** NAMESPACE NAME READY STATUS RESTARTS AGE build-service build-service-controller-manager-7dcd8d4b77-r6tcc 1/1 Running 0 2m26s cert-manager cert-manager-66d46f75d6-4rhzk 1/1 Running 0 10m cert-manager cert-manager-cainjector-856bdc4b95-cffqg 1/1 Running 0 10m cert-manager cert-manager-webhook-7fdfc5cd79-t4qw8 1/1 Running 0 10m cert-manager trust-manager-7c9f8b8f7d-fpm5b 1/1 Running 0 9m44s dex dex-845c496cbf-np2jh 1/1 Running 1 (5m19s ago) 5m31s integration-service integration-service-controller-manager-bf5465989-g6vlt 1/1 Running 0 2m8s kind-registry registry-68dcdc78fb-ftvvr 1/1 Running 0 5m25s konflux-ui proxy-5d667fb864-v5j66 2/2 Running 0 110s kube-system coredns-668d6bf9bc-hnkgm 1/1 Running 0 14m kube-system coredns-668d6bf9bc-wdflq 1/1 Running 0 14m kube-system etcd-kind-mapt-control-plane 1/1 Running 0 14m kube-system kindnet-ttfc9 1/1 Running 0 14m kube-system kube-apiserver-kind-mapt-control-plane 1/1 Running 0 14m kube-system kube-controller-manager-kind-mapt-control-plane 1/1 Running 0 14m kube-system kube-proxy-hcjm8 1/1 Running 0 14m kube-system kube-scheduler-kind-mapt-control-plane 1/1 Running 0 14m kyverno kyverno-admission-controller-59475bc6d6-jb275 1/1 Running 0 4m52s local-path-storage local-path-provisioner-7dc846544d-6xltz 1/1 Running 0 14m namespace-lister namespace-lister-78fcb78b8c-qrmns 1/1 Running 0 119s pipelines-as-code pipelines-as-code-controller-6d6f9b857f-6qrnh 1/1 Running 0 5m52s pipelines-as-code pipelines-as-code-watcher-564bccfcd5-j8gtt 1/1 Running 0 5m51s pipelines-as-code pipelines-as-code-webhook-85c878899f-nsrwx 1/1 Running 0 5m50s release-service release-service-controller-manager-6d6d59f87-twjds 1/1 Running 0 2m58s smee-client gosmee-client-85d98b7896-s56dn 2/2 Running 0 5m11s tekton-operator tekton-operator-596b885757-c8ck9 2/2 Running 0 9m7s tekton-operator tekton-operator-webhook-85dd8445c9-ppqpt 1/1 Running 0 9m6s tekton-pipelines tekton-chains-controller-7d89d5d76c-zj9jf 1/1 Running 0 6m10s tekton-pipelines tekton-chains-signing-secret-dmb9c 0/1 Completed 1 3m45s tekton-pipelines tekton-events-controller-5bfd6c8dd5-vvcbw 1/1 Running 0 8m39s tekton-pipelines tekton-operator-proxy-webhook-67988c89c7-6bbmc 1/1 Running 0 8m39s tekton-pipelines tekton-pipelines-controller-f47d4c949-tzxpt 1/1 Running 0 8m39s tekton-pipelines tekton-pipelines-remote-resolvers-5589cf5778-6wv72 1/1 Running 0 6m13s tekton-pipelines tekton-pipelines-webhook-5ddc49dd9f-gztkl 1/1 Running 0 8m39s tekton-pipelines tekton-results-api-864fcb8bc6-vmvjb 1/1 Running 0 7m11s tekton-pipelines tekton-results-postgres-0 1/1 Running 0 5m4s tekton-pipelines tekton-results-retention-policy-agent-5c464b6f76-vzcq9 1/1 Running 0 7m10s tekton-pipelines tekton-results-watcher-7c4cc4d554-vfp8c 1/1 Running 0 7m10s tekton-pipelines tekton-triggers-controller-7846bc79f-94mrn 1/1 Running 0 7m55s tekton-pipelines tekton-triggers-core-interceptors-6fc664875-9f569 1/1 Running 0 7m55s tekton-pipelines tekton-triggers-webhook-674844dfb8-k45dn 1/1 Running 0 7m55s [INFO] Applying Kyverno to reduce resources for testing clusterpolicy.kyverno.io/reduce-tekton-pr-taskrun-resource-requests created [INFO] Creating Test Resources... ๐Ÿงช Deploying test resources... ๐Ÿ‘ฅ Setting up demo users... namespace/user-ns1 created namespace/user-ns2 created serviceaccount/appstudio-pipeline created serviceaccount/konflux-integration-runner created serviceaccount/appstudio-pipeline created serviceaccount/konflux-integration-runner created role.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator created rolebinding.rbac.authorization.k8s.io/konflux-integration-runner-rolebinding created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created rolebinding.rbac.authorization.k8s.io/konflux-integration-runner-rolebinding created rolebinding.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator-binding created rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding created rolebinding.rbac.authorization.k8s.io/user1-konflux-admin created rolebinding.rbac.authorization.k8s.io/user2-konflux-admin created clusterrolebinding.rbac.authorization.k8s.io/managed1-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/managed2-self-access-review created clusterrolebinding.rbac.authorization.k8s.io/user1-self-access-review created secret/regcred-empty created application.appstudio.redhat.com/sample-component created component.appstudio.redhat.com/sample-component created releaseplan.appstudio.redhat.com/local-release created releaseplan.appstudio.redhat.com/sample-component created integrationtestscenario.appstudio.redhat.com/sample-component-enterprise-contract created