[DEBUG] --to-registry not specified but detected an OCP cluster => will try to use the internal OCP cluster registry as mirror registry [DEBUG] >>> WORKING DIR: /tmp/tmp.Lz67W7zRyY <<< [DEBUG] mikefarah yq v4.45.1 installed to /home/asoro/.local/bin/yq_mf [DEBUG] Exposing cluster registry... config.imageregistry.operator.openshift.io/cluster patched (no change) config.imageregistry.operator.openshift.io/cluster patched (no change) Login Succeeded! Login Succeeded! clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:rhdh-operator:default" clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:openshift4:default" clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:rhdh:default" clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:rhel9:default" clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:oc-mirror:default" secret "internal-reg-ext-auth-for-rhdh" deleted secret/internal-reg-ext-auth-for-rhdh created secret "internal-reg-auth-for-rhdh" deleted secret/internal-reg-auth-for-rhdh created clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:rhdh-operator:default" secret "internal-reg-ext-auth-for-rhdh" deleted secret/internal-reg-ext-auth-for-rhdh created secret "internal-reg-auth-for-rhdh" deleted secret/internal-reg-auth-for-rhdh created clusterrole.rbac.authorization.k8s.io/system:image-signer added: "system:serviceaccount:openshift-marketplace:default" clusterrole.rbac.authorization.k8s.io/system:image-puller added: "system:serviceaccount:openshift-marketplace:default" clusterrole.rbac.authorization.k8s.io/system:image-puller added: "system:serviceaccount:rhdh-operator:default" clusterrole.rbac.authorization.k8s.io/system:image-puller added: "system:serviceaccount:rhdh-operator:rhdh-operator" [DEBUG] currentRegistryAuthFile: /run/user/1000/containers/auth.json [DEBUG] REGISTRY_AUTH_FILE: /tmp/tmp.JQahrXwhfn/containers/auth.json [DEBUG] yq filter: {"auths": { "registry.redhat.io": .auths."registry.redhat.io", "quay.io": .auths."quay.io", "default-route-openshift-image-registry.apps.rosa.nf777-4vxht-bfd.kuzp.p3.openshiftapps.com": .auths."default-route-openshift-image-registry.apps.rosa.nf777-4vxht-bfd.kuzp.p3.openshiftapps.com" }} [DEBUG] Rendering index image registry.redhat.io/redhat/redhat-operator-index:v4.18 as a local file: /tmp/tmp.Lz67W7zRyY/rhdh/rhdh/render.yaml... [DEBUG] Fetching metadata for the rhdh operator catalog channel, packages, and bundles. [DEBUG] chanFilterList=(.schema == "olm.channel" and .package == "rhdh" and .name == "fast-1.4") or (.schema == "olm.channel" and .package == "rhdh" and .name == "fast-1.5")  [DEBUG] chanEntriesFilterList=.name == "rhdh-operator.v1.4*" or .name == "rhdh-operator.v1.5*"  [DEBUG] bundleFilterList=(.schema == "olm.bundle" and .name == "rhdh-operator.v1.4*") or (.schema == "olm.bundle" and .name == "rhdh-operator.v1.5*")  [DEBUG] Got 675 lines of JSON from the index! [DEBUG] bundleImg=registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:2981d2470951ea1e26eb968aefc39ab48ab7d9634a520cf2bbd8c5fef313db15 [DEBUG] bundleImg=registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a91c4931ef5111c555ec5cc8128c3148c94fe2983d2e4fa7babe843e9292b303 [DEBUG] bundleImg=registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:c3fcfee584652ee840c655ac4dd141743bafd5043865f20dd78116bc33e9e850 [DEBUG] bundleImg=registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:c870eb3d17807a9d04011df5244ea39db66af76aefd0af68244c95ed8322d8b5 [DEBUG] Regenerating Dockerfile so the index can be rebuilt... [INFO] Building the catalog image locally. /tmp/tmp.Lz67W7zRyY/rhdh /tmp/tmp.Lz67W7zRyY ~/work/projects/backstage/janus-idp/operator [1/2] STEP 1/3: FROM quay.io/operator-framework/opm:latest AS builder [1/2] STEP 2/3: ADD rhdh /configs --> 81650f8d004a [1/2] STEP 3/3: RUN ["/bin/opm", "serve", "/configs", "--cache-dir=/tmp/cache", "--cache-only"] time="2025-03-28T16:42:51Z" level=warning msg="unable to set termination log path" error="open /dev/termination-log: permission denied" time="2025-03-28T16:42:51Z" level=info msg="cache directory is empty, using preferred backend" backend=pogreb.v1 cache=/tmp/cache configs=/configs time="2025-03-28T16:42:51Z" level=info msg="starting pprof endpoint" address="localhost:6060" time="2025-03-28T16:42:51Z" level=info msg="building cache" cache=/tmp/cache configs=/configs --> c46f8428b600 [2/2] STEP 1/6: FROM quay.io/operator-framework/opm:latest [2/2] STEP 2/6: ENTRYPOINT ["/bin/opm"] --> ed5d9e89e7b9 [2/2] STEP 3/6: CMD ["serve", "/configs", "--cache-dir=/tmp/cache"] --> 0470bbb8268f [2/2] STEP 4/6: COPY --from=builder /configs /configs --> 0eb24e7981e4 [2/2] STEP 5/6: COPY --from=builder /tmp/cache /tmp/cache --> 5ea19403a2ef [2/2] STEP 6/6: LABEL operators.operatorframework.io.index.configs.v1=/configs [2/2] COMMIT default-route-openshift-image-registry.apps.rosa.nf777-4vxht-bfd.kuzp.p3.openshiftapps.com/rhdh/index:v4.18 --> e9c71a931194 Successfully tagged default-route-openshift-image-registry.apps.rosa.nf777-4vxht-bfd.kuzp.p3.openshiftapps.com/rhdh/index:v4.18 e9c71a93119455a34f3f7f8809d463b04ec7d0e0a488608d451f30d810153618 [INFO] Deploying your catalog image to the default-route-openshift-image-registry.apps.rosa.nf777-4vxht-bfd.kuzp.p3.openshiftapps.com/rhdh/index:v4.18 registry. Copying blob sha256:ac805962e47900b616b2f4b4584a34ac7b07d64ac1fd2c077478cf65311addcc Copying blob sha256:8fa10c0194df9b7c054c90dbe482585f768a54428fc90a5b78a0066a123b1bba Copying blob sha256:ddc6e550070ca022d94bd4415de20545ba69954033b4985045a8b05f538bbe5c Copying blob sha256:af5aa97ebe6ce1604747ec1e21af7136ded391bcabe4acef882e718a87c86bcc Copying blob sha256:d37950ece3d30af513521db15b49bfcc95853a6664fe784eeea059572a5bbe55 Copying blob sha256:4d049f83d9cf21d1f5cc0e11deaf36df02790d0e60c1a3829538fb4b61685368 Copying blob sha256:bbb6cacb8c82e4da4e8143e03351e939eab5e21ce0ef333c42e637af86c5217b Copying blob sha256:2a92d6ac9e4fcc274d5168b217ca4458a9fec6f094ead68d99c77073f08caac1 Copying blob sha256:1a73b54f556b477f0a8b939d13c504a3b4f4db71f7a09c63afbc10acb3de5849 Copying blob sha256:f4aee9e53c42a22ed82451218c3ea03d1eea8d6ca8fbe8eb4e950304ba8a8bb3 Copying blob sha256:b336e209998fa5cf0eec3dabf93a21194198a35f4f75612d8da03693f8c30217 Copying blob sha256:3f0dbb44ecc4b3bb9f9df67248157befc04955e8ca9c058e526211c9df4253ef Copying blob sha256:366e7af892cc5c926930106a0154946b67be240160a5c43334f985e168d0db70 Copying blob sha256:ee11305b42f572298439ae772186f1f5f100069f43ecab8e75043b9316d57fa0 Copying blob sha256:5fe41034abc2366c72b99399173d1f9bb3faf317e60807e44def46fd81fd3819 Copying blob sha256:2a3f0c28458e312c373de03ac04f2f43235c298625346a42b68880eb2b091f04 Copying blob sha256:b273b275f60e684640a14ae18abc789a954d8115186fc05ec551647ce4eedd76 Copying config sha256:e9c71a93119455a34f3f7f8809d463b04ec7d0e0a488608d451f30d810153618 Writing manifest to image destination /tmp/tmp.Lz67W7zRyY ~/work/projects/backstage/janus-idp/operator [DEBUG] Extra images: ... [DEBUG] ... done. [DEBUG] Detected an OpenShift cluster [DEBUG] Extra images from CLI: ... The imagedigestmirrorsets "rhdh-idms" is invalid: : ValidatingAdmissionPolicy 'mirror' with binding 'mirror-binding' denied request: This resource cannot be created, updated, or deleted. Please ask your administrator to modify the resource in the HostedCluster object.