[INFO] Fetching and executing solve-pr-pairing.sh... [INFO] Setting up env vars for 'release-service' [INFO] Writing env file to /var/workdir/.env COMPONENT_NAME=release-service IMAGE_REPO=quay.io/redhat-user-workloads/rhtap-release-2-tenant/release-service/release-service IMAGE_TAG=on-pr-496f2c9ea27bd29b932885dc7cb4039f39c5ef3a PR_OWNER=joejstuart PR_SHA=496f2c9ea27bd29b932885dc7cb4039f39c5ef3a [INFO] Checking for paired PR in redhat-appstudio/infra-deployments [INFO] No paired PR found in redhat-appstudio/infra-deployments. Falling back to branch: main [INFO] Downloading release_service_config.yaml... [INFO] Downloaded release-service-config.yaml [INFO] Downloading release-pipeline-resources-clusterrole.yaml... [INFO] Downloaded release-pipeline-resources-clusterrole.yaml [INFO] Configuration files updated. [INFO] Loading env vars from /var/workdir/.env: COMPONENT_NAME=release-service IMAGE_REPO=quay.io/redhat-user-workloads/rhtap-release-2-tenant/release-service/release-service IMAGE_TAG=on-pr-496f2c9ea27bd29b932885dc7cb4039f39c5ef3a PR_OWNER=joejstuart PR_SHA=496f2c9ea27bd29b932885dc7cb4039f39c5ef3a [INFO] Updating image repository to quay.io/redhat-user-workloads/rhtap-release-2-tenant/release-service/release-service [INFO] Updating image tag to on-pr-496f2c9ea27bd29b932885dc7cb4039f39c5ef3a [INFO] Updating GitHub reference to joejstuart@496f2c9ea27bd29b932885dc7cb4039f39c5ef3a [INFO] kubernetes cluster is hosted on: https://3.149.34.250:6443 [INFO] Configuring PAC_WEBHOOK_URL to use smee channel: https://hook.pipelinesascode.com/FMPGBULUKAyF Kubernetes control plane is running at https://3.149.34.250:6443 CoreDNS is running at https://3.149.34.250:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [INFO] Installing Konflux CI dependencies ๐Ÿ” Checking requirements kubectl is installed openssl is installed Checking kubectl version kubectl version v1.35.1 meets minimum requirement (v1.31.4) All requirements are met Continue ๐Ÿงช Testing PVC creation for default storage class Creating PVC from './dependencies/pre-deployment-pvc-binding' using the cluster's default storage class === Storage Diagnostics (Initial State) === --- Storage Classes --- NAME PROVISIONER RECLAIMPOLICY VOLUMEBINDINGMODE ALLOWVOLUMEEXPANSION AGE standard (default) rancher.io/local-path Delete WaitForFirstConsumer false 2m35s === End Storage Diagnostics === namespace/test-pvc-ns created persistentvolumeclaim/test-pvc created pod/test-pvc-consumer created persistentvolumeclaim/test-pvc condition met namespace "test-pvc-ns" deleted persistentvolumeclaim "test-pvc" deleted from test-pvc-ns namespace pod "test-pvc-consumer" deleted from test-pvc-ns namespace PVC binding successfull ๐ŸŒŠ Deploying Konflux Dependencies ๐Ÿ” Deploying Cert Manager... namespace/cert-manager created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created serviceaccount/cert-manager created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager-startupapicheck created serviceaccount/cert-manager-webhook created role.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created rolebinding.rbac.authorization.k8s.io/cert-manager-startupapicheck:create-cert created rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created service/cert-manager created service/cert-manager-cainjector created service/cert-manager-webhook created deployment.apps/cert-manager created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager-webhook created job.batch/cert-manager-startupapicheck created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met ๐Ÿค Deploying Trust Manager... customresourcedefinition.apiextensions.k8s.io/bundles.trust.cert-manager.io created serviceaccount/trust-manager created role.rbac.authorization.k8s.io/trust-manager created role.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrole.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager created rolebinding.rbac.authorization.k8s.io/trust-manager:leaderelection created clusterrolebinding.rbac.authorization.k8s.io/trust-manager created service/trust-manager created service/trust-manager-metrics created deployment.apps/trust-manager created certificate.cert-manager.io/trust-manager created issuer.cert-manager.io/trust-manager created validatingwebhookconfiguration.admissionregistration.k8s.io/trust-manager created pod/trust-manager-5d5c6867f9-wh2lk condition met ๐Ÿ“œ Setting up Cluster Issuer... Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/selfsigned-ca created clusterissuer.cert-manager.io/ca-issuer created clusterissuer.cert-manager.io/self-signed-cluster-issuer created ๐Ÿฑ Deploying Tekton... ๐Ÿฑ Installing Tekton via upstream Operator... namespace/tekton-operator created customresourcedefinition.apiextensions.k8s.io/manualapprovalgates.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/syncerservices.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonchains.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonconfigs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektondashboards.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonhubs.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektoninstallersets.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonmulticlusterproxyaaes.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpipelines.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonpruners.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonresults.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektonschedulers.operator.tekton.dev created customresourcedefinition.apiextensions.k8s.io/tektontriggers.operator.tekton.dev created serviceaccount/tekton-operator created role.rbac.authorization.k8s.io/tekton-operator-info created clusterrole.rbac.authorization.k8s.io/tekton-config-read-role created clusterrole.rbac.authorization.k8s.io/tekton-multicluster-proxy-aae-role created clusterrole.rbac.authorization.k8s.io/tekton-operator created clusterrole.rbac.authorization.k8s.io/tekton-result-read-role created clusterrole.rbac.authorization.k8s.io/tekton-scheduler-role created rolebinding.rbac.authorization.k8s.io/tekton-operator-info created clusterrolebinding.rbac.authorization.k8s.io/tekton-config-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-multicluster-proxy-aae-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-operator created clusterrolebinding.rbac.authorization.k8s.io/tekton-result-read-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/tekton-scheduler-rolebinding created configmap/config-logging created configmap/tekton-config-defaults created configmap/tekton-config-observability created configmap/tekton-operator-controller-config-leader-election created configmap/tekton-operator-info created configmap/tekton-operator-webhook-config-leader-election created secret/tekton-operator-webhook-certs created service/tekton-operator created service/tekton-operator-webhook created deployment.apps/tekton-operator created deployment.apps/tekton-operator-webhook created pod/tekton-operator-6b96d7c975-54pt5 condition met pod/tekton-operator-webhook-65d7569769-nbdjp condition met tektonconfig.operator.tekton.dev/config condition met โš™๏ธ Configuring Tekton... Warning: resource tektonconfigs/config is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. tektonconfig.operator.tekton.dev/config configured ๐Ÿ”„ Setting up Pipeline As Code... namespace/pipelines-as-code created customresourcedefinition.apiextensions.k8s.io/repositories.pipelinesascode.tekton.dev created serviceaccount/pipelines-as-code-controller created serviceaccount/pipelines-as-code-watcher created serviceaccount/pipelines-as-code-webhook created role.rbac.authorization.k8s.io/pipelines-as-code-controller-role created role.rbac.authorization.k8s.io/pipelines-as-code-info created role.rbac.authorization.k8s.io/pipelines-as-code-watcher-role created role.rbac.authorization.k8s.io/pipelines-as-code-webhook-role created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-controller-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-watcher-clusterrole created clusterrole.rbac.authorization.k8s.io/pipeline-as-code-webhook-clusterrole created clusterrole.rbac.authorization.k8s.io/pipelines-as-code-aggregate created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-info created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-binding created rolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-binding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-controller-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-watcher-clusterbinding created clusterrolebinding.rbac.authorization.k8s.io/pipelines-as-code-webhook-clusterbinding created configmap/pac-config-logging created configmap/pac-watcher-config-leader-election created configmap/pac-webhook-config-leader-election created configmap/pipelines-as-code created configmap/pipelines-as-code-config-observability created configmap/pipelines-as-code-info created secret/pipelines-as-code-webhook-certs created service/pipelines-as-code-controller created service/pipelines-as-code-watcher created service/pipelines-as-code-webhook created deployment.apps/pipelines-as-code-controller created deployment.apps/pipelines-as-code-watcher created deployment.apps/pipelines-as-code-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/validation.pipelinesascode.tekton.dev created tektonconfig.operator.tekton.dev/config condition met ๐Ÿ” Setting up Tekton Chains RBAC... # Warning: 'patchesJson6902' is deprecated. Please use 'patches' instead. Run 'kustomize edit fix' to update your Kustomization automatically. namespace/openshift-pipelines created serviceaccount/chains-secrets-admin created role.rbac.authorization.k8s.io/chains-secret-admin created role.rbac.authorization.k8s.io/chains-secret-admin created clusterrole.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created rolebinding.rbac.authorization.k8s.io/chains-secret-admin created rolebinding.rbac.authorization.k8s.io/tekton-chains-public-key-viewer created job.batch/tekton-chains-signing-secret created ๐Ÿ”‘ Deploying Dex... namespace/dex created serviceaccount/dex created clusterrole.rbac.authorization.k8s.io/dex created clusterrolebinding.rbac.authorization.k8s.io/dex created configmap/dex-f9ffdmcgd2 created service/dex created deployment.apps/dex created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/dex-cert created Error from server (NotFound): secrets "oauth2-proxy-client-secret" not found ๐Ÿ”‘ Creating secret oauth2-proxy-client-secret secret/oauth2-proxy-client-secret created ๐Ÿ“ฆ Deploying Registry... namespace/kind-registry created configmap/zot-config created service/registry-service created deployment.apps/registry created Warning: spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. certificate.cert-manager.io/registry-cert created bundle.trust.cert-manager.io/trusted-ca created pod/registry-6546dff65-2qvcn condition met ๐Ÿ”„ Deploying Smee... Randomizing smee-channel ID namespace/smee-client created deployment.apps/gosmee-client created ๐Ÿ›ก๏ธ Deploying Kyverno... namespace/kyverno serverside-applied customresourcedefinition.apiextensions.k8s.io/cleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clustercleanuppolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/clusterpolicyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/deletingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/ephemeralreports.reports.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/generatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/globalcontextentries.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/imagevalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/mutatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespaceddeletingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedgeneratingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedimagevalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedmutatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/namespacedvalidatingpolicies.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyexceptions.policies.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/policyreports.wgpolicyk8s.io serverside-applied customresourcedefinition.apiextensions.k8s.io/updaterequests.kyverno.io serverside-applied customresourcedefinition.apiextensions.k8s.io/validatingpolicies.policies.kyverno.io serverside-applied serviceaccount/kyverno-admission-controller serverside-applied serviceaccount/kyverno-background-controller serverside-applied serviceaccount/kyverno-cleanup-controller serverside-applied serviceaccount/kyverno-reports-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied role.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno-manage-resources serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:admission-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:background-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:cleanup-controller:core serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:admin:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policies serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:policyreports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:reports serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:rbac:view:updaterequests serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrole.rbac.authorization.k8s.io/kyverno:reports-controller:core serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied rolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:admission-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:background-controller:view serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:cleanup-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller serverside-applied clusterrolebinding.rbac.authorization.k8s.io/kyverno:reports-controller:view serverside-applied configmap/kyverno serverside-applied configmap/kyverno-metrics serverside-applied service/kyverno-background-controller-metrics serverside-applied service/kyverno-cleanup-controller serverside-applied service/kyverno-cleanup-controller-metrics serverside-applied service/kyverno-reports-controller-metrics serverside-applied service/kyverno-svc serverside-applied service/kyverno-svc-metrics serverside-applied deployment.apps/kyverno-admission-controller serverside-applied deployment.apps/kyverno-background-controller serverside-applied deployment.apps/kyverno-cleanup-controller serverside-applied deployment.apps/kyverno-reports-controller serverside-applied โณ Waiting for Kyverno admission controller... error: timed out waiting for the condition on deployments/kyverno-admission-controller ๐Ÿ”„ Retrying command (attempt 2/3)... deployment.apps/kyverno-admission-controller condition met clusterpolicy.kyverno.io/reduce-tekton-pr-taskrun-resource-requests created clusterpolicy.kyverno.io/set-skip-checks-parameter created ๐Ÿ“‹ Deploying Konflux Info... namespace/konflux-info created role.rbac.authorization.k8s.io/konflux-public-info-view-role created rolebinding.rbac.authorization.k8s.io/konflux-public-info-view-rb created configmap/konflux-banner-configmap created configmap/konflux-public-info created ๐Ÿณ Deploying Quay... โญ๏ธ Skipping Quay deployment โณ Waiting for the dependencies to be ready โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met โณ Waiting for Tekton configuration to be ready... tektonconfig.operator.tekton.dev/config condition met โณ Waiting for all deployments to be available... deployment.apps/cert-manager condition met deployment.apps/cert-manager-cainjector condition met deployment.apps/cert-manager-webhook condition met deployment.apps/trust-manager condition met deployment.apps/dex condition met deployment.apps/registry condition met deployment.apps/coredns condition met deployment.apps/kyverno-admission-controller condition met deployment.apps/kyverno-background-controller condition met deployment.apps/kyverno-cleanup-controller condition met deployment.apps/kyverno-reports-controller condition met deployment.apps/local-path-provisioner condition met deployment.apps/pipelines-as-code-controller condition met deployment.apps/pipelines-as-code-watcher condition met deployment.apps/pipelines-as-code-webhook condition met deployment.apps/gosmee-client condition met deployment.apps/tekton-operator condition met deployment.apps/tekton-operator-webhook condition met deployment.apps/tekton-chains-controller condition met deployment.apps/tekton-events-controller condition met deployment.apps/tekton-operator-proxy-webhook condition met deployment.apps/tekton-pipelines-controller condition met deployment.apps/tekton-pipelines-remote-resolvers condition met deployment.apps/tekton-pipelines-webhook condition met deployment.apps/tekton-results-api condition met deployment.apps/tekton-results-retention-policy-agent condition met deployment.apps/tekton-results-watcher condition met deployment.apps/tekton-triggers-controller condition met deployment.apps/tekton-triggers-core-interceptors condition met deployment.apps/tekton-triggers-webhook condition met [INFO] Installing Konflux CI... Deploying Konflux ๐Ÿš€ Deploying Application API CRDs... customresourcedefinition.apiextensions.k8s.io/applications.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/componentdetectionqueries.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/components.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclaims.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargetclasses.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/deploymenttargets.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/environments.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/promotionruns.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshotenvironmentbindings.appstudio.redhat.com created customresourcedefinition.apiextensions.k8s.io/snapshots.appstudio.redhat.com created ๐Ÿ‘ฅ Setting up RBAC permissions... clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-batch created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-admin-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-contributor-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-maintainer-user-actions-extra created clusterrole.rbac.authorization.k8s.io/konflux-self-access-reviewer created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions-core created clusterrole.rbac.authorization.k8s.io/konflux-viewer-user-actions-extra created ๐Ÿ“œ Deploying Enterprise Contract... namespace/enterprise-contract-service created customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role created clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role created rolebinding.rbac.authorization.k8s.io/public-ec-cm created rolebinding.rbac.authorization.k8s.io/public-ecp created configmap/ec-defaults created resource mapping not found for name: "all" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "default" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-no-hermetic" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "redhat-trusted-tasks" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "slsa3" namespace: "enterprise-contract-service" from "./konflux-ci/enterprise-contract": no matches for kind "EnterpriseContractPolicy" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first ๐Ÿ”„ Retrying command (attempt 2/3)... namespace/enterprise-contract-service unchanged customresourcedefinition.apiextensions.k8s.io/enterprisecontractpolicies.appstudio.redhat.com unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-editor-role unchanged clusterrole.rbac.authorization.k8s.io/enterprisecontractpolicy-viewer-role unchanged rolebinding.rbac.authorization.k8s.io/public-ec-cm unchanged rolebinding.rbac.authorization.k8s.io/public-ecp unchanged configmap/ec-defaults unchanged enterprisecontractpolicy.appstudio.redhat.com/all created enterprisecontractpolicy.appstudio.redhat.com/default created enterprisecontractpolicy.appstudio.redhat.com/redhat created enterprisecontractpolicy.appstudio.redhat.com/redhat-no-hermetic created enterprisecontractpolicy.appstudio.redhat.com/redhat-trusted-tasks created enterprisecontractpolicy.appstudio.redhat.com/slsa3 created ๐ŸŽฏ Deploying Release Service... error: accumulating resources: accumulation err='accumulating resources from 'core': '/var/workdir/konflux-ci/release/core' must resolve to a file': recursed accumulation of path '/var/workdir/konflux-ci/release/core': accumulating resources: accumulation err='accumulating resources from 'https://github.com/joejstuart/release-service/config/default?ref=496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': URL is a git repository': failed to run '/usr/bin/git fetch --depth=1 https://github.com/joejstuart/release-service 496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': fatal: could not read Username for 'https://github.com': No such device or address : exit status 128 ๐Ÿ”„ Retrying command (attempt 2/3)... error: accumulating resources: accumulation err='accumulating resources from 'core': '/var/workdir/konflux-ci/release/core' must resolve to a file': recursed accumulation of path '/var/workdir/konflux-ci/release/core': accumulating resources: accumulation err='accumulating resources from 'https://github.com/joejstuart/release-service/config/default?ref=496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': URL is a git repository': failed to run '/usr/bin/git fetch --depth=1 https://github.com/joejstuart/release-service 496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': fatal: could not read Username for 'https://github.com': No such device or address : exit status 128 ๐Ÿ”„ Retrying command (attempt 3/3)... error: accumulating resources: accumulation err='accumulating resources from 'core': '/var/workdir/konflux-ci/release/core' must resolve to a file': recursed accumulation of path '/var/workdir/konflux-ci/release/core': accumulating resources: accumulation err='accumulating resources from 'https://github.com/joejstuart/release-service/config/default?ref=496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': URL is a git repository': failed to run '/usr/bin/git fetch --depth=1 https://github.com/joejstuart/release-service 496f2c9ea27bd29b932885dc7cb4039f39c5ef3a': fatal: could not read Username for 'https://github.com': No such device or address : exit status 128 [INFO] Reading required secrets... [INFO] Deploying image-controller... ๐Ÿ’ง Starting Image Controller deployment... ๐ŸŒŠ Deploying Image Controller components... namespace/image-controller created customresourcedefinition.apiextensions.k8s.io/imagerepositories.appstudio.redhat.com created serviceaccount/image-controller-controller-manager created role.rbac.authorization.k8s.io/image-controller-leader-election-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-editor-role created clusterrole.rbac.authorization.k8s.io/image-controller-imagerepository-viewer-role created clusterrole.rbac.authorization.k8s.io/image-controller-manager-role created clusterrole.rbac.authorization.k8s.io/image-controller-metrics-auth-role created rolebinding.rbac.authorization.k8s.io/image-controller-leader-election-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-manager-rolebinding created clusterrolebinding.rbac.authorization.k8s.io/image-controller-metrics-auth-rolebinding created configmap/image-controller-image-pruner-configmap-mmk4bf6tc8 created configmap/image-controller-notification-resetter-configmap-tfm9h79698 created service/image-controller-controller-manager-metrics-service created deployment.apps/image-controller-controller-manager created cronjob.batch/image-controller-image-pruner-cronjob created cronjob.batch/image-controller-notification-resetter-cronjob created ๐Ÿ”‘ Setting up Quay credentials... ๐Ÿ”‘ Creating new Quay secret... secret/quaytoken created โณ Waiting for Image Controller to be ready... โณ Waiting for Image Controller pods to be ready... pod/image-controller-controller-manager-7df969cd9d-5st7g condition met [INFO] Adding PaC secrets to pipelines-as-code... secret/pipelines-as-code-secret created error: failed to create secret namespaces "build-service" not found [INFO] Creating Test Resources... Deploying test resources... Setting up demo users... namespace/user-ns1 serverside-applied namespace/user-ns2 serverside-applied serviceaccount/release-pipeline serverside-applied serviceaccount/default serverside-applied serviceaccount/release-pipeline serverside-applied role.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator serverside-applied rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding serverside-applied rolebinding.rbac.authorization.k8s.io/user1-konflux-admin serverside-applied rolebinding.rbac.authorization.k8s.io/user2-konflux-admin serverside-applied rolebinding.rbac.authorization.k8s.io/ns2-pod-viewer-job-creator-binding serverside-applied rolebinding.rbac.authorization.k8s.io/release-pipeline-resource-role-binding serverside-applied rolebinding.rbac.authorization.k8s.io/user1-konflux-admin serverside-applied rolebinding.rbac.authorization.k8s.io/user2-konflux-admin serverside-applied clusterrolebinding.rbac.authorization.k8s.io/managed1-self-access-review serverside-applied clusterrolebinding.rbac.authorization.k8s.io/managed2-self-access-review serverside-applied clusterrolebinding.rbac.authorization.k8s.io/user1-self-access-review serverside-applied secret/regcred-empty serverside-applied Waiting for Kyverno to finish processing generate rules... No resources found Kyverno processing complete. Deploying sample components... application.appstudio.redhat.com/sample-component serverside-applied component.appstudio.redhat.com/sample-component serverside-applied resource mapping not found for name: "local-release" namespace: "user-ns1" from "./test/resources/demo-users/user/sample-components/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component" namespace: "user-ns1" from "./test/resources/demo-users/user/sample-components/": no matches for kind "ReleasePlan" in version "appstudio.redhat.com/v1alpha1" ensure CRDs are installed first resource mapping not found for name: "sample-component-enterprise-contract" namespace: "user-ns1" from "./test/resources/demo-users/user/sample-components/": no matches for kind "IntegrationTestScenario" in version "appstudio.redhat.com/v1beta2" ensure CRDs are installed first [INFO] Creating cluster-config ConfigMap in konflux-info namespace... namespace/konflux-info configured configmap/cluster-config created [INFO] cluster-config ConfigMap created. [INFO] Creating ClusterRole and ClusterRoleBinding for cluster-config read access... clusterrole.rbac.authorization.k8s.io/read-cluster-config created clusterrolebinding.rbac.authorization.k8s.io/read-cluster-config created [INFO] RBAC for cluster-config created.