+ unset CI + exit_code=0 + scripts/openshift-CI-kuttl-tests.sh + export CI=prow + CI=prow + go mod vendor go: downloading github.com/argoproj-labs/argo-rollouts-manager v0.0.5-0.20241023053239-85db81b64541 go: downloading github.com/argoproj-labs/argocd-operator v0.14.1-0.20250530065728-e624ae0781b4 go: downloading github.com/coreos/prometheus-operator v0.40.0 go: downloading github.com/openshift/api v0.0.0-20240906151052-5d963dce87aa go: downloading github.com/operator-framework/api v0.17.5 go: downloading go.uber.org/zap v1.27.0 go: downloading k8s.io/apiextensions-apiserver v0.28.3 go: downloading k8s.io/apimachinery v0.28.3 go: downloading k8s.io/client-go v0.28.3 go: downloading sigs.k8s.io/controller-runtime v0.17.2 go: downloading k8s.io/api v0.28.3 go: downloading golang.org/x/mod v0.22.0 go: downloading github.com/stretchr/testify v1.10.0 go: downloading sigs.k8s.io/yaml v1.4.0 go: downloading gotest.tools v2.2.0+incompatible go: downloading github.com/onsi/ginkgo v1.16.4 go: downloading github.com/onsi/gomega v1.14.0 go: downloading github.com/go-logr/logr v1.4.2 go: downloading github.com/hashicorp/go-version v1.6.0 go: downloading k8s.io/utils v0.0.0-20240102154912-e7106e64919e go: downloading github.com/google/go-cmp v0.6.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading k8s.io/klog/v2 v2.120.1 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 go: downloading github.com/argoproj/argo-cd/v2 v2.12.3 go: downloading github.com/cert-manager/cert-manager v1.14.4 go: downloading github.com/openshift/client-go v0.0.0-20200325131901-f7baeb993edb go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/prometheus/client_golang v1.21.0 go: downloading github.com/sethvargo/go-password v0.3.1 go: downloading github.com/go-logr/zapr v1.3.0 go: downloading github.com/google/gofuzz v1.2.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading k8s.io/kube-aggregator v0.28.3 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/evanphx/json-patch/v5 v5.9.0 go: downloading github.com/evanphx/json-patch v5.9.0+incompatible go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading golang.org/x/net v0.33.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading golang.org/x/sys v0.28.0 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/client_model v0.6.1 go: downloading github.com/prometheus/common v0.62.0 go: downloading github.com/prometheus/procfs v0.15.1 go: downloading google.golang.org/protobuf v1.36.1 go: downloading golang.org/x/exp v0.0.0-20240222234643-814bf88cf225 go: downloading k8s.io/component-base v0.28.3 go: downloading github.com/klauspost/compress v1.17.11 go: downloading github.com/fsnotify/fsnotify v1.7.0 go: downloading github.com/imdario/mergo v0.3.16 go: downloading github.com/spf13/pflag v1.0.5 go: downloading golang.org/x/term v0.27.0 go: downloading golang.org/x/oauth2 v0.24.0 go: downloading golang.org/x/time v0.5.0 go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/nxadm/tail v1.4.8 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading sigs.k8s.io/gateway-api v1.0.0 go: downloading github.com/google/uuid v1.6.0 go: downloading golang.org/x/text v0.21.0 go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 go: downloading github.com/go-openapi/swag v0.22.9 go: downloading github.com/go-openapi/jsonreference v0.20.4 go: downloading github.com/emicklei/go-restful/v3 v3.11.3 go: downloading github.com/go-openapi/jsonpointer v0.20.2 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/gobwas/glob v0.2.3 go: downloading golang.org/x/crypto v0.31.0 go: downloading github.com/dlclark/regexp2 v1.11.2 ++ dirname scripts/openshift-CI-kuttl-tests.sh + source scripts/e2e-common.sh + KUBECONFIG=/tmp/kubeconfig-1021273547 ++ mktemp -d + TMP_DIR=/tmp/tmp.BqeMKw4gtt + cp /tmp/kubeconfig-1021273547 /tmp/tmp.BqeMKw4gtt/kubeconfig + chmod 640 /tmp/tmp.BqeMKw4gtt/kubeconfig + export KUBECONFIG=/tmp/tmp.BqeMKw4gtt/kubeconfig + KUBECONFIG=/tmp/tmp.BqeMKw4gtt/kubeconfig + cp /tmp/tmp.BqeMKw4gtt/kubeconfig /go/src/github.com/redhat-developer/gitops-operator/kubeconfig + pod=openshift-gitops-operator-controller-manager ++ oc get pods --all-namespaces ++ grep openshift-gitops-operator-controller-manager ++ head -1 ++ awk '{print $2}' + oc get pods openshift-gitops-operator-controller-manager-67fbbc4b49-z96db -n openshift-gitops-operator -o yaml apiVersion: v1 kind: Pod metadata: annotations: alm-examples: |- [ { "apiVersion": "argoproj.io/v1alpha1", "kind": "AppProject", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "Application", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "ApplicationSet", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "NotificationsConfiguration", "metadata": { "name": "default-notifications-configuration" }, "spec": { "templates": { "template.app-created": "email:\n subject: Application {{.app.metadata.name}} has been created.\nmessage: Application {{.app.metadata.name}} has been created.\nteams:\n title: Application {{.app.metadata.name}} has been created.", "template.app-deleted": "email:\n subject: Application {{.app.metadata.name}} has been deleted.\nmessage: Application {{.app.metadata.name}} has been deleted.\nteams:\n title: Application {{.app.metadata.name}} has been deleted.", "template.app-deployed": "email:\n subject: New version of an application {{.app.metadata.name}} is up and running.\nmessage: |\n {{if eq .serviceType \"slack\"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} is now running new version of deployments manifests.\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#18be52\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n },\n {\n \"title\": \"Revision\",\n \"value\": \"{{.app.status.sync.revision}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n },\n {\n \"name\": \"Revision\",\n \"value\": \"{{.app.status.sync.revision}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Operation Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#000080'\n title: New version of an application {{.app.metadata.name}} is up and running.", "template.app-health-degraded": "email:\n subject: Application {{.app.metadata.name}} has degraded.\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} Application {{.app.metadata.name}} has degraded.\n Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\": \"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#f4c030\",\n \"fields\": [\n {\n \"title\": \"Health Status\",\n \"value\": \"{{.app.status.health.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Health Status\",\n \"value\": \"{{.app.status.health.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#FF0000'\n title: Application {{.app.metadata.name}} has degraded.", "template.app-sync-failed": "email:\n subject: Failed to sync application {{.app.metadata.name}}.\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} The sync operation of application {{.app.metadata.name}} has failed at {{.app.status.operationState.finishedAt}} with the following error: {{.app.status.operationState.message}}\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#E96D76\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Failed at\",\n \"value\": \"{{.app.status.operationState.finishedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Operation\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#FF0000'\n title: Failed to sync application {{.app.metadata.name}}.", "template.app-sync-running": "email:\n subject: Start syncing application {{.app.metadata.name}}.\nmessage: |\n The sync operation of application {{.app.metadata.name}} has started at {{.app.status.operationState.startedAt}}.\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#0DADEA\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Started at\",\n \"value\": \"{{.app.status.operationState.startedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Operation\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n title: Start syncing application {{.app.metadata.name}}.", "template.app-sync-status-unknown": "email:\n subject: Application {{.app.metadata.name}} sync status is 'Unknown'\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} Application {{.app.metadata.name}} sync is 'Unknown'.\n Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.\n {{if ne .serviceType \"slack\"}}\n {{range $c := .app.status.conditions}}\n * {{$c.message}}\n {{end}}\n {{end}}\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#E96D76\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n title: Application {{.app.metadata.name}} sync status is 'Unknown'", "template.app-sync-succeeded": "email:\n subject: Application {{.app.metadata.name}} has been successfully synced.\nmessage: |\n {{if eq .serviceType \"slack\"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} has been successfully synced at {{.app.status.operationState.finishedAt}}.\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#18be52\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Synced at\",\n \"value\": \"{{.app.status.operationState.finishedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Operation Details\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#000080'\n title: Application {{.app.metadata.name}} has been successfully synced" }, "triggers": { "trigger.on-created": "- description: Application is created.\n oncePer: app.metadata.name\n send:\n - app-created\n when: \"true\"", "trigger.on-deleted": "- description: Application is deleted.\n oncePer: app.metadata.name\n send:\n - app-deleted\n when: app.metadata.deletionTimestamp != nil", "trigger.on-deployed": "- description: Application is synced and healthy. Triggered once per commit.\n oncePer: app.status.operationState.syncResult.revision\n send:\n - app-deployed\n when: app.status.operationState.phase in ['Succeeded'] and app.status.health.status\n == 'Healthy'", "trigger.on-health-degraded": "- description: Application has degraded\n send:\n - app-health-degraded\n when: app.status.health.status == 'Degraded'", "trigger.on-sync-failed": "- description: Application syncing has failed\n send:\n - app-sync-failed\n when: app.status.operationState.phase in ['Error', 'Failed']", "trigger.on-sync-running": "- description: Application is being synced\n send:\n - app-sync-running\n when: app.status.operationState.phase in ['Running']", "trigger.on-sync-status-unknown": "- description: Application status is 'Unknown'\n send:\n - app-sync-status-unknown\n when: app.status.sync.status == 'Unknown'", "trigger.on-sync-succeeded": "- description: Application syncing has succeeded\n send:\n - app-sync-succeeded\n when: app.status.operationState.phase in ['Succeeded']" } } }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "Rollout", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "RolloutManager", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1beta1", "kind": "ArgoCD", "metadata": { "name": "argocd" }, "spec": { "controller": { "resources": { "limits": { "cpu": "2000m", "memory": "2048Mi" }, "requests": { "cpu": "250m", "memory": "1024Mi" } } }, "ha": { "enabled": false, "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "rbac": { "defaultPolicy": "", "policy": "g, system:cluster-admins, role:admin\n", "scopes": "[groups]" }, "redis": { "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "repo": { "resources": { "limits": { "cpu": "1000m", "memory": "1024Mi" }, "requests": { "cpu": "250m", "memory": "256Mi" } } }, "resourceExclusions": "- apiGroups:\n - tekton.dev\n clusters:\n - '*'\n kinds:\n - TaskRun\n - PipelineRun \n", "server": { "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "125m", "memory": "128Mi" } }, "route": { "enabled": true } }, "sso": { "dex": { "openShiftOAuth": true, "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "provider": "dex" } } }, { "apiVersion": "pipelines.openshift.io/v1alpha1", "kind": "GitopsService", "metadata": { "name": "gitopsservice-sample" }, "spec": null } ] capabilities: Deep Insights console.openshift.io/plugins: '["gitops-plugin"]' containerImage: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e687c595910b16550cb4f784e538db93b11e8778e67100e79f2ca04404bda80e createdAt: "2025-07-30T13:03:16Z" description: Enables teams to adopt GitOps principles for managing cluster configurations and application delivery across hybrid multi-cluster Kubernetes environments. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "false" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "true" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.131.0.21/23"],"mac_address":"0a:58:0a:83:00:15","gateway_ips":["10.131.0.1"],"routes":[{"dest":"10.128.0.0/14","nextHop":"10.131.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.131.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.131.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.131.0.1"}],"ip_address":"10.131.0.21/23","gateway_ip":"10.131.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.131.0.21" ], "mac": "0a:58:0a:83:00:15", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager olm.operatorGroup: global-operators olm.operatorNamespace: openshift-gitops-operator olm.skipRange: '>=1.0.0 <1.17.0' olm.targetNamespaces: "" olmcahash: 97f9a02712bfb4b8f31a7a4f8b17ed2c52508d0496764ffa1598ccdb14d3564a openshift.io/scc: restricted-v2 operatorframework.io/cluster-monitoring: "true" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AnalysisRun","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AnalysisTemplate","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AppProject","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Application","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ApplicationSet","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ArgoCD","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ArgoCD","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ClusterAnalysisTemplate","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Experiment","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"NotificationsConfiguration","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Rollout","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"RolloutManager","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"pipelines.openshift.io","kind":"GitopsService","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"openshift-gitops-operator","version":"1.17.0"}}]}' operatorframework.io/suggested-namespace: openshift-gitops-operator operators.openshift.io/infrastructure-features: '["disconnected"]' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.35.0 operators.operatorframework.io/internal-objects: '["gitopsservices.pipelines.openshift.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/redhat-developer/gitops-operator seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user support: Red Hat creationTimestamp: "2025-08-11T07:34:13Z" generateName: openshift-gitops-operator-controller-manager-67fbbc4b49- generation: 1 labels: control-plane: gitops-operator pod-template-hash: 67fbbc4b49 name: openshift-gitops-operator-controller-manager-67fbbc4b49-z96db namespace: openshift-gitops-operator ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: openshift-gitops-operator-controller-manager-67fbbc4b49 uid: d4c7a766-52ba-4ae9-bf7f-7c88ef9ed4de resourceVersion: "33657" uid: 2337b957-c1d6-49af-8857-2bbc995c7b35 spec: containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 - --leader-elect command: - /usr/local/bin/manager env: - name: ARGOCD_CLUSTER_CONFIG_NAMESPACES value: openshift-gitops - name: CLUSTER_SCOPED_ARGO_ROLLOUTS_NAMESPACES value: openshift-gitops - name: OPERATOR_NAME value: gitops-operator - name: LABEL_SELECTOR - name: ENABLE_CONVERSION_WEBHOOK value: "true" - name: RELATED_IMAGE_ARGOCD_DEX_IMAGE value: registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:159a54e7ef025bb84a6dad81c8c231cce5deb49c7837af29ea9dbd174e77b601 - name: ARGOCD_DEX_IMAGE value: registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:159a54e7ef025bb84a6dad81c8c231cce5deb49c7837af29ea9dbd174e77b601 - name: RELATED_IMAGE_ARGOCD_KEYCLOAK_IMAGE value: registry.redhat.io/rh-sso-7/sso76-openshift-rhel8@sha256:4d22a26de729f883866143898637ebfb0c4a3012b51d64881da156d103606e3b - name: ARGOCD_KEYCLOAK_IMAGE value: registry.redhat.io/rh-sso-7/sso76-openshift-rhel8@sha256:4d22a26de729f883866143898637ebfb0c4a3012b51d64881da156d103606e3b - name: RELATED_IMAGE_BACKEND_IMAGE value: registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:4fb9586b66bbd1b708047402cc1bebb6bd1ad628c12703d49c757490b9885622 - name: BACKEND_IMAGE value: registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:4fb9586b66bbd1b708047402cc1bebb6bd1ad628c12703d49c757490b9885622 - name: RELATED_IMAGE_ARGOCD_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e7e117a67daa8acb6a30571b786ff92dae8191f8f1230cfc534aacc83b4b8563 - name: ARGOCD_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e7e117a67daa8acb6a30571b786ff92dae8191f8f1230cfc534aacc83b4b8563 - name: ARGOCD_REPOSERVER_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e7e117a67daa8acb6a30571b786ff92dae8191f8f1230cfc534aacc83b4b8563 - name: RELATED_IMAGE_ARGOCD_REDIS_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:2fca0decc49230122f044afb2e7cd8f64921a00141c8c22c2f1402f3564f87f8 - name: ARGOCD_REDIS_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:2fca0decc49230122f044afb2e7cd8f64921a00141c8c22c2f1402f3564f87f8 - name: ARGOCD_REDIS_HA_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:2fca0decc49230122f044afb2e7cd8f64921a00141c8c22c2f1402f3564f87f8 - name: RELATED_IMAGE_ARGOCD_REDIS_HA_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-haproxy-router@sha256:0e74179eabfa1e1548f940879d8f6c8a72380945d015fb9373ee415a50c7b933 - name: ARGOCD_REDIS_HA_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-haproxy-router@sha256:0e74179eabfa1e1548f940879d8f6c8a72380945d015fb9373ee415a50c7b933 - name: RELATED_IMAGE_GITOPS_CONSOLE_PLUGIN_IMAGE value: registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:3d291b9cb5041c44ddff26eaa93af9e7343eef3d95643d367f81e6df47d4b56f - name: GITOPS_CONSOLE_PLUGIN_IMAGE value: registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:3d291b9cb5041c44ddff26eaa93af9e7343eef3d95643d367f81e6df47d4b56f - name: RELATED_IMAGE_ARGOCD_EXTENSION_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:5099d104a1c73011662274864a1f640b28bbc2e19fd2394ec5955b7dcd36e128 - name: ARGOCD_EXTENSION_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:5099d104a1c73011662274864a1f640b28bbc2e19fd2394ec5955b7dcd36e128 - name: RELATED_IMAGE_ARGO_ROLLOUTS_IMAGE value: registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:0a5a1bdad98eb87477db93b7bb8eac5039a9739bb31258a4fc578873e99ef75e - name: ARGO_ROLLOUTS_IMAGE value: registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:0a5a1bdad98eb87477db93b7bb8eac5039a9739bb31258a4fc578873e99ef75e - name: RELATED_IMAGE_MUST_GATHER_IMAGE value: registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:54cb97fd42320389cdc874c1b6d225b95189e76169a2f5375e3ca5bc18fa4863 - name: RELATED_IMAGE_KUBE_RBAC_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:9b7aabfbead92df3a4afeb1854e45a92f23da52321d1705fce444510fa856145 - name: OPERATOR_CONDITION_NAME value: openshift-gitops-operator.v1.17.0 image: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e687c595910b16550cb4f784e538db93b11e8778e67100e79f2ca04404bda80e imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager ports: - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true runAsNonRoot: true runAsUser: 1000740000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-bvcbd readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080 - --tls-cert-file=/etc/tls/private/tls.crt - --tls-private-key-file=/etc/tls/private/tls.key - --logtostderr=true - --allow-paths=/metrics - --http2-disable env: - name: OPERATOR_CONDITION_NAME value: openshift-gitops-operator.v1.17.0 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:9b7aabfbead92df3a4afeb1854e45a92f23da52321d1705fce444510fa856145 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: metrics protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 1m memory: 15Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000740000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/tls/private name: kube-rbac-proxy-tls readOnly: true - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-bvcbd readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openshift-gitops-operator-controller-manager-dockercfg-hjlxv nodeName: ip-10-0-86-185.ec2.internal preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000740000 runAsNonRoot: true seLinuxOptions: level: s0:c27,c19 seccompProfile: type: RuntimeDefault serviceAccount: openshift-gitops-operator-controller-manager serviceAccountName: openshift-gitops-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-rbac-proxy-tls secret: defaultMode: 420 secretName: kube-rbac-proxy-tls - name: apiservice-cert secret: defaultMode: 420 items: - key: tls.crt path: apiserver.crt - key: tls.key path: apiserver.key secretName: openshift-gitops-operator-controller-manager-service-cert - name: webhook-cert secret: defaultMode: 420 items: - key: tls.crt path: tls.crt - key: tls.key path: tls.key secretName: openshift-gitops-operator-controller-manager-service-cert - name: kube-api-access-bvcbd projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2025-08-11T07:34:21Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-08-11T07:34:13Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-08-11T07:34:21Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-08-11T07:34:21Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-08-11T07:34:13Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 1m memory: 15Mi containerID: cri-o://7ab32c2d2272dd585a7ed80d257d23f697f8f7f380af562b17929caef386f351 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:9b7aabfbead92df3a4afeb1854e45a92f23da52321d1705fce444510fa856145 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:778d6062e1bea1405ccc5ccfe99354e2284cd99a4d60160c67c3e12006b9610f lastState: {} name: kube-rbac-proxy ready: true resources: limits: cpu: 500m memory: 128Mi requests: cpu: 1m memory: 15Mi restartCount: 0 started: true state: running: startedAt: "2025-08-11T07:34:21Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000740000 uid: 1000740000 volumeMounts: - mountPath: /etc/tls/private name: kube-rbac-proxy-tls readOnly: true recursiveReadOnly: Disabled - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-bvcbd readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://260ee218e35aa9b49e4a3ccdbc1644cfb1172dd483cdc2e6882cf158ba925072 image: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e687c595910b16550cb4f784e538db93b11e8778e67100e79f2ca04404bda80e imageID: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:544226c8a3e830119a0b71f24caa4b30a2dff327d8e68a3562a900ce7b07e497 lastState: {} name: manager ready: true resources: {} restartCount: 0 started: true state: running: startedAt: "2025-08-11T07:34:16Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000740000 uid: 1000740000 volumeMounts: - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-bvcbd readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.86.185 hostIPs: - ip: 10.0.86.185 phase: Running podIP: 10.131.0.21 podIPs: - ip: 10.131.0.21 qosClass: Burstable startTime: "2025-08-11T07:34:13Z" + subscription=gitops-operator- ++ oc get subscription --all-namespaces ++ grep gitops-operator- ++ head -1 ++ awk '{print $2}' + oc get subscription -n openshift-gitops-operator NAME PACKAGE SOURCE CHANNEL openshift-gitops-operator openshift-gitops-operator redhat-operators latest + oc wait --for=condition=Ready -n openshift-gitops pod --timeout=15m -l 'app.kubernetes.io/name in (cluster,openshift-gitops-application-controller,openshift-gitops-applicationset-controller,openshift-gitops-dex-server,openshift-gitops-redis,openshift-gitops-repo-server,openshift-gitops-server)' pod/cluster-785cfc5f75-q6q7w condition met pod/openshift-gitops-application-controller-0 condition met pod/openshift-gitops-applicationset-controller-549d7f6686-xgrc8 condition met pod/openshift-gitops-dex-server-7f5f97bdc8-g85sz condition met pod/openshift-gitops-redis-6d65c94d4b-trxqs condition met pod/openshift-gitops-repo-server-79db854c58-gc7gm condition met pod/openshift-gitops-server-f488b848-zd85t condition met + oc create ns test-argocd namespace/test-argocd created + cat + oc apply -f - Warning: ArgoCD v1alpha1 version is deprecated and will be converted to v1beta1 automatically. Moving forward, please use v1beta1 as the ArgoCD API version. argocd.argoproj.io/argocd created + sleep 60s + oc get pods -n test-argocd NAME READY STATUS RESTARTS AGE argocd-application-controller-0 1/1 Running 0 59s argocd-redis-746795758b-7hvwh 1/1 Running 0 59s argocd-repo-server-779f974c47-9dhhf 1/1 Running 0 59s argocd-server-685c8c99c7-74zdp 1/1 Running 0 59s + oc wait --for=condition=Ready -n test-argocd pod --timeout=15m -l 'app.kubernetes.io/name in (argocd-application-controller,argocd-redis,argocd-repo-server,argocd-server)' pod/argocd-application-controller-0 condition met pod/argocd-redis-746795758b-7hvwh condition met pod/argocd-repo-server-779f974c47-9dhhf condition met pod/argocd-server-685c8c99c7-74zdp condition met + echo '>> Running tests on prow' >> Running tests on prow + kubectl kuttl test test/openshift/e2e/sequential --config test/openshift/e2e/sequential/kuttl-test.yaml --report xml 2025/08/11 07:36:30 kutt-test config testdirs is overridden with args: [ test/openshift/e2e/sequential ] === RUN kuttl harness.go:460: starting setup harness.go:251: running tests using configured kubeconfig. I0811 07:36:31.167048 192 request.go:655] Throttling request took 1.02937355s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/cloud.network.openshift.io/v1?timeout=32s harness.go:356: running tests harness.go:74: going to run test suite with timeout of 720 seconds for each step harness.go:368: testsuite: test/openshift/e2e/sequential has 22 tests === RUN kuttl/harness === RUN kuttl/harness/1-002_validate_backend_service === PAUSE kuttl/harness/1-002_validate_backend_service === RUN kuttl/harness/1-008_validate-4.9CI-Failures === PAUSE kuttl/harness/1-008_validate-4.9CI-Failures === RUN kuttl/harness/1-020_validate_redis_ha_nonha === PAUSE kuttl/harness/1-020_validate_redis_ha_nonha === RUN kuttl/harness/1-026-validate_backend_service_permissions === PAUSE kuttl/harness/1-026-validate_backend_service_permissions === RUN kuttl/harness/1-028_validate_run_on_infra === PAUSE kuttl/harness/1-028_validate_run_on_infra === RUN kuttl/harness/1-034_validate_custom_roles === PAUSE kuttl/harness/1-034_validate_custom_roles === RUN kuttl/harness/1-035_validate_argocd_secret_repopulate === PAUSE kuttl/harness/1-035_validate_argocd_secret_repopulate === RUN kuttl/harness/1-040_validate_quoted_RBAC_group_names === PAUSE kuttl/harness/1-040_validate_quoted_RBAC_group_names === RUN kuttl/harness/1-041_validate_argocd_sync_alert === PAUSE kuttl/harness/1-041_validate_argocd_sync_alert === RUN kuttl/harness/1-050_validate_sso === PAUSE kuttl/harness/1-050_validate_sso === RUN kuttl/harness/1-056_validate_managed-by === PAUSE kuttl/harness/1-056_validate_managed-by === RUN kuttl/harness/1-071_validate_node_selectors === PAUSE kuttl/harness/1-071_validate_node_selectors === RUN kuttl/harness/1-077_validate_workload_status_monitoring_alert === PAUSE kuttl/harness/1-077_validate_workload_status_monitoring_alert === RUN kuttl/harness/1-078_validate_default_argocd_consoleLink === PAUSE kuttl/harness/1-078_validate_default_argocd_consoleLink === RUN kuttl/harness/1-084_validate_prune_templates === PAUSE kuttl/harness/1-084_validate_prune_templates === RUN kuttl/harness/1-085_validate_dynamic_plugin_installation === PAUSE kuttl/harness/1-085_validate_dynamic_plugin_installation === RUN kuttl/harness/1-086_validate_default_argocd_role === PAUSE kuttl/harness/1-086_validate_default_argocd_role === RUN kuttl/harness/1-100_validate_rollouts_resources_creation === PAUSE kuttl/harness/1-100_validate_rollouts_resources_creation === RUN kuttl/harness/1-101_validate_rollout_policyrules === PAUSE kuttl/harness/1-101_validate_rollout_policyrules === RUN kuttl/harness/1-105_validate_label_selector === PAUSE kuttl/harness/1-105_validate_label_selector === RUN kuttl/harness/1-106_validate_argocd_metrics_controller === PAUSE kuttl/harness/1-106_validate_argocd_metrics_controller === RUN kuttl/harness/1-107_validate_redis_ssc === PAUSE kuttl/harness/1-107_validate_redis_ssc === CONT kuttl/harness/1-002_validate_backend_service logger.go:42: 07:36:35 | 1-002_validate_backend_service | Creating namespace: kuttl-test-cosmic-labrador logger.go:42: 07:36:35 | 1-002_validate_backend_service/1-check-backend-service | starting test step 1-check-backend-service logger.go:42: 07:36:38 | 1-002_validate_backend_service/1-check-backend-service | test step completed 1-check-backend-service logger.go:42: 07:36:38 | 1-002_validate_backend_service | skipping kubernetes event logging logger.go:42: 07:36:38 | 1-002_validate_backend_service | Deleting namespace: kuttl-test-cosmic-labrador === CONT kuttl/harness/1-071_validate_node_selectors logger.go:42: 07:36:38 | 1-071_validate_node_selectors | Creating namespace: kuttl-test-moving-rabbit logger.go:42: 07:36:38 | 1-071_validate_node_selectors/1- | starting test step 1- I0811 07:36:41.216207 192 request.go:655] Throttling request took 2.574762234s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/tuned.openshift.io/v1?timeout=32s logger.go:42: 07:36:41 | 1-071_validate_node_selectors/1- | test step completed 1- logger.go:42: 07:36:41 | 1-071_validate_node_selectors/2-custom-node-selector | starting test step 2-custom-node-selector logger.go:42: 07:36:41 | 1-071_validate_node_selectors/2-custom-node-selector | running command: [sh -c oc patch gitopsservice cluster --type=merge --patch='{"spec": {"nodeSelector": {"key1": "value1"}}}' ] logger.go:42: 07:36:41 | 1-071_validate_node_selectors/2-custom-node-selector | gitopsservice.pipelines.openshift.io/cluster patched logger.go:42: 07:36:44 | 1-071_validate_node_selectors/2-custom-node-selector | test step completed 2-custom-node-selector logger.go:42: 07:36:44 | 1-071_validate_node_selectors/3-patch-run-on-infra | starting test step 3-patch-run-on-infra logger.go:42: 07:36:44 | 1-071_validate_node_selectors/3-patch-run-on-infra | running command: [sh -c oc patch gitopsservice cluster --type=merge --patch='{"spec": {"runOnInfra": true, "tolerations": [{"effect": "NoSchedule", "key": "infra", "value": "reserved"}]}}' ] logger.go:42: 07:36:44 | 1-071_validate_node_selectors/3-patch-run-on-infra | gitopsservice.pipelines.openshift.io/cluster patched logger.go:42: 07:36:47 | 1-071_validate_node_selectors/3-patch-run-on-infra | test step completed 3-patch-run-on-infra logger.go:42: 07:36:47 | 1-071_validate_node_selectors/4-change-back | starting test step 4-change-back logger.go:42: 07:36:47 | 1-071_validate_node_selectors/4-change-back | running command: [sh -c oc patch gitopsservice cluster --type=json --patch='[{"op": "remove", "path": "/spec/tolerations"}, {"op": "remove", "path": "/spec/runOnInfra"}, {"op": "remove", "path": "/spec/nodeSelector"}]' oc patch statefulset openshift-gitops-application-controller -n openshift-gitops -p '{"spec":{"replicas":0}}' ] logger.go:42: 07:36:47 | 1-071_validate_node_selectors/4-change-back | gitopsservice.pipelines.openshift.io/cluster patched logger.go:42: 07:36:47 | 1-071_validate_node_selectors/4-change-back | statefulset.apps/openshift-gitops-application-controller patched logger.go:42: 07:36:50 | 1-071_validate_node_selectors/4-change-back | test step completed 4-change-back logger.go:42: 07:36:50 | 1-071_validate_node_selectors | skipping kubernetes event logging logger.go:42: 07:36:50 | 1-071_validate_node_selectors | Deleting namespace: kuttl-test-moving-rabbit === CONT kuttl/harness/1-107_validate_redis_ssc logger.go:42: 07:36:50 | 1-107_validate_redis_ssc | Creating namespace: kuttl-test-live-goblin logger.go:42: 07:36:50 | 1-107_validate_redis_ssc/1-install | starting test step 1-install I0811 07:36:51.909797 192 request.go:655] Throttling request took 1.02603723s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/authorization.k8s.io/v1?timeout=32s Warning: ArgoCD v1alpha1 version is deprecated and will be converted to v1beta1 automatically. Moving forward, please use v1beta1 as the ArgoCD API version. logger.go:42: 07:36:53 | 1-107_validate_redis_ssc/1-install | ArgoCD:kuttl-test-live-goblin/argocd created logger.go:42: 07:38:57 | 1-107_validate_redis_ssc/1-install | test step completed 1-install logger.go:42: 07:38:57 | 1-107_validate_redis_ssc/2-check-ha-redis-server-ssc | starting test step 2-check-ha-redis-server-ssc logger.go:42: 07:38:57 | 1-107_validate_redis_ssc/2-check-ha-redis-server-ssc | running command: [sh -c pod_name=$(oc get pod -l app.kubernetes.io/name=argocd-redis-ha -n $NAMESPACE -o jsonpath="{.items[0].metadata.name}") actual_scc=$(oc get pod $pod_name -n $NAMESPACE -o jsonpath="{.metadata.annotations.openshift\.io/scc}") expected_scc="restricted-v2" if [[ "$actual_scc" != "$expected_scc" ]]; then echo "SCC check failed: Expected '$expected_scc' but got '$actual_scc'" exit 1 else echo "SCC check passed: '$actual_scc'" fi ] logger.go:42: 07:38:58 | 1-107_validate_redis_ssc/2-check-ha-redis-server-ssc | SCC check passed: 'restricted-v2' I0811 07:38:59.220383 192 request.go:655] Throttling request took 1.014711727s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/argoproj.io/v1beta1?timeout=32s logger.go:42: 07:39:00 | 1-107_validate_redis_ssc/2-check-ha-redis-server-ssc | test step completed 2-check-ha-redis-server-ssc logger.go:42: 07:39:00 | 1-107_validate_redis_ssc/3-check-ha-proxy-ssc | starting test step 3-check-ha-proxy-ssc logger.go:42: 07:39:00 | 1-107_validate_redis_ssc/3-check-ha-proxy-ssc | running command: [sh -c pod_name=$(oc get pod -l app.kubernetes.io/name=argocd-redis-ha-haproxy -n $NAMESPACE -o jsonpath="{.items[0].metadata.name}") actual_scc=$(oc get pod $pod_name -n $NAMESPACE -o jsonpath="{.metadata.annotations.openshift\.io/scc}") expected_scc="restricted-v2" if [[ "$actual_scc" != "$expected_scc" ]]; then echo "SCC check failed: Expected '$expected_scc' but got '$actual_scc'" exit 1 else echo "SCC check passed: '$actual_scc'" fi ] logger.go:42: 07:39:01 | 1-107_validate_redis_ssc/3-check-ha-proxy-ssc | SCC check passed: 'restricted-v2' logger.go:42: 07:39:04 | 1-107_validate_redis_ssc/3-check-ha-proxy-ssc | test step completed 3-check-ha-proxy-ssc logger.go:42: 07:39:04 | 1-107_validate_redis_ssc | skipping kubernetes event logging logger.go:42: 07:39:04 | 1-107_validate_redis_ssc | Deleting namespace: kuttl-test-live-goblin === CONT kuttl/harness/1-106_validate_argocd_metrics_controller logger.go:42: 07:39:04 | 1-106_validate_argocd_metrics_controller | Creating namespace: kuttl-test-ready-dassie logger.go:42: 07:39:04 | 1-106_validate_argocd_metrics_controller/1- | starting test step 1- logger.go:42: 07:39:07 | 1-106_validate_argocd_metrics_controller/1- | test step completed 1- logger.go:42: 07:39:07 | 1-106_validate_argocd_metrics_controller/2-disable-metrics | starting test step 2-disable-metrics logger.go:42: 07:39:07 | 1-106_validate_argocd_metrics_controller/2-disable-metrics | running command: [sh -c oc patch argocd openshift-gitops -n openshift-gitops --type='json' -p='[{"op": "replace", "path": "/spec/monitoring/disableMetrics", "value": true}]' ] logger.go:42: 07:39:07 | 1-106_validate_argocd_metrics_controller/2-disable-metrics | argocd.argoproj.io/openshift-gitops patched I0811 07:39:09.257744 192 request.go:655] Throttling request took 1.921735681s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/monitoring.coreos.com/v1?timeout=32s logger.go:42: 07:39:10 | 1-106_validate_argocd_metrics_controller/2-disable-metrics | test step completed 2-disable-metrics logger.go:42: 07:39:10 | 1-106_validate_argocd_metrics_controller/3-enable-metrics | starting test step 3-enable-metrics logger.go:42: 07:39:10 | 1-106_validate_argocd_metrics_controller/3-enable-metrics | running command: [sh -c oc patch argocd openshift-gitops -n openshift-gitops --type='json' -p='[{"op": "replace", "path": "/spec/monitoring/disableMetrics", "value": false}]' ] logger.go:42: 07:39:10 | 1-106_validate_argocd_metrics_controller/3-enable-metrics | argocd.argoproj.io/openshift-gitops patched logger.go:42: 07:39:13 | 1-106_validate_argocd_metrics_controller/3-enable-metrics | test step completed 3-enable-metrics logger.go:42: 07:39:13 | 1-106_validate_argocd_metrics_controller | skipping kubernetes event logging logger.go:42: 07:39:13 | 1-106_validate_argocd_metrics_controller | Deleting namespace: kuttl-test-ready-dassie === CONT kuttl/harness/1-105_validate_label_selector logger.go:42: 07:39:13 | 1-105_validate_label_selector | Creating namespace: kuttl-test-whole-dassie logger.go:42: 07:39:13 | 1-105_validate_label_selector/1-add-label-selector | starting test step 1-add-label-selector logger.go:42: 07:39:13 | 1-105_validate_label_selector/1-add-label-selector | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator ARGOCD_LABEL_SELECTOR=foo=bar -c manager elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "ARGOCD_LABEL_SELECTOR", "value": "foo=bar"}]}}}' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type merge --patch '{"spec": {"config": {"env": [{"name": "ARGOCD_LABEL_SELECTOR", "value": "foo=bar"}]}}}' fi ] logger.go:42: 07:39:13 | 1-105_validate_label_selector/1-add-label-selector | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 07:39:13 | 1-105_validate_label_selector/1-add-label-selector | running command: [sh -c sleep 120] I0811 07:41:14.621639 192 request.go:655] Throttling request took 1.029259932s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/olm.operatorframework.io/v1?timeout=32s logger.go:42: 07:41:16 | 1-105_validate_label_selector/1-add-label-selector | test step completed 1-add-label-selector logger.go:42: 07:41:16 | 1-105_validate_label_selector/2-install | starting test step 2-install logger.go:42: 07:41:19 | 1-105_validate_label_selector/2-install | ArgoCD:test-argocd/test1 created logger.go:42: 07:41:19 | 1-105_validate_label_selector/2-install | test step completed 2-install logger.go:42: 07:41:19 | 1-105_validate_label_selector/3-add-label | starting test step 3-add-label logger.go:42: 07:41:19 | 1-105_validate_label_selector/3-add-label | running command: [sh -c kubectl label argocd test1 foo=bar -n test-argocd ] logger.go:42: 07:41:19 | 1-105_validate_label_selector/3-add-label | argocd.argoproj.io/test1 labeled logger.go:42: 07:41:19 | 1-105_validate_label_selector/3-add-label | running command: [sh -c sleep 30] I0811 07:41:50.362627 192 request.go:655] Throttling request took 1.01235583s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/security.openshift.io/v1?timeout=32s logger.go:42: 07:41:55 | 1-105_validate_label_selector/3-add-label | test step completed 3-add-label logger.go:42: 07:41:55 | 1-105_validate_label_selector/4-install | starting test step 4-install logger.go:42: 07:41:58 | 1-105_validate_label_selector/4-install | ArgoCD:test-argocd/test1 updated logger.go:42: 07:41:59 | 1-105_validate_label_selector/4-install | test step completed 4-install logger.go:42: 07:41:59 | 1-105_validate_label_selector/5-remove-label | starting test step 5-remove-label logger.go:42: 07:41:59 | 1-105_validate_label_selector/5-remove-label | running command: [sh -c kubectl label argocd test1 foo- -n test-argocd ] logger.go:42: 07:41:59 | 1-105_validate_label_selector/5-remove-label | argocd.argoproj.io/test1 unlabeled logger.go:42: 07:41:59 | 1-105_validate_label_selector/5-remove-label | running command: [sh -c sleep 30] I0811 07:42:30.293151 192 request.go:655] Throttling request took 1.013028449s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/controlplane.operator.openshift.io/v1alpha1?timeout=32s logger.go:42: 07:42:32 | 1-105_validate_label_selector/5-remove-label | test step completed 5-remove-label logger.go:42: 07:42:32 | 1-105_validate_label_selector/6-install | starting test step 6-install logger.go:42: 07:42:34 | 1-105_validate_label_selector/6-install | ArgoCD:test-argocd/test1 updated logger.go:42: 07:42:34 | 1-105_validate_label_selector/6-install | test step completed 6-install logger.go:42: 07:42:34 | 1-105_validate_label_selector/7-remove-label-selector | starting test step 7-remove-label-selector logger.go:42: 07:42:34 | 1-105_validate_label_selector/7-remove-label-selector | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator ARGOCD_LABEL_SELECTOR- -c manager elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type json --patch '[{"op": "remove", "path": "/spec/config"}]' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type json --patch '[{"op": "remove", "path": "/spec/config"}]' fi ] logger.go:42: 07:42:35 | 1-105_validate_label_selector/7-remove-label-selector | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 07:42:35 | 1-105_validate_label_selector/7-remove-label-selector | running command: [sh -c sleep 120] I0811 07:44:36.190043 192 request.go:655] Throttling request took 1.031028996s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/autoscaling/v2?timeout=32s logger.go:42: 07:44:37 | 1-105_validate_label_selector/7-remove-label-selector | test step completed 7-remove-label-selector logger.go:42: 07:44:37 | 1-105_validate_label_selector | skipping kubernetes event logging logger.go:42: 07:44:37 | 1-105_validate_label_selector | Deleting namespace: kuttl-test-whole-dassie === CONT kuttl/harness/1-101_validate_rollout_policyrules logger.go:42: 07:44:37 | 1-101_validate_rollout_policyrules | Creating namespace: kuttl-test-perfect-flamingo logger.go:42: 07:44:37 | 1-101_validate_rollout_policyrules/1-install-rollloutmanager | starting test step 1-install-rollloutmanager logger.go:42: 07:44:40 | 1-101_validate_rollout_policyrules/1-install-rollloutmanager | RolloutManager:openshift-gitops/example-rollout-manager created logger.go:42: 07:44:40 | 1-101_validate_rollout_policyrules/1-install-rollloutmanager | test step completed 1-install-rollloutmanager logger.go:42: 07:44:40 | 1-101_validate_rollout_policyrules | skipping kubernetes event logging logger.go:42: 07:44:40 | 1-101_validate_rollout_policyrules | Deleting namespace: kuttl-test-perfect-flamingo === CONT kuttl/harness/1-100_validate_rollouts_resources_creation logger.go:42: 07:44:40 | 1-100_validate_rollouts_resources_creation | Creating namespace: kuttl-test-present-fawn logger.go:42: 07:44:41 | 1-100_validate_rollouts_resources_creation/1-install-rolloutmanager | starting test step 1-install-rolloutmanager logger.go:42: 07:44:43 | 1-100_validate_rollouts_resources_creation/1-install-rolloutmanager | RolloutManager:openshift-gitops/example-rollout-manager created logger.go:42: 07:45:03 | 1-100_validate_rollouts_resources_creation/1-install-rolloutmanager | test step completed 1-install-rolloutmanager logger.go:42: 07:45:03 | 1-100_validate_rollouts_resources_creation/2- | starting test step 2- I0811 07:45:04.369977 192 request.go:655] Throttling request took 1.025900428s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/ingress.operator.openshift.io/v1?timeout=32s logger.go:42: 07:45:06 | 1-100_validate_rollouts_resources_creation/2- | test step completed 2- logger.go:42: 07:45:06 | 1-100_validate_rollouts_resources_creation | skipping kubernetes event logging logger.go:42: 07:45:06 | 1-100_validate_rollouts_resources_creation | Deleting namespace: kuttl-test-present-fawn === CONT kuttl/harness/1-086_validate_default_argocd_role logger.go:42: 07:45:06 | 1-086_validate_default_argocd_role | Creating namespace: kuttl-test-prime-leech logger.go:42: 07:45:06 | 1-086_validate_default_argocd_role/1- | starting test step 1- logger.go:42: 07:45:09 | 1-086_validate_default_argocd_role/1- | test step completed 1- logger.go:42: 07:45:09 | 1-086_validate_default_argocd_role/2-install | starting test step 2-install logger.go:42: 07:45:11 | 1-086_validate_default_argocd_role/2-install | Namespace:/test-1-086-custom created logger.go:42: 07:45:11 | 1-086_validate_default_argocd_role/2-install | Namespace:/test-1-086-custom2 created logger.go:42: 07:45:11 | 1-086_validate_default_argocd_role/2-install | Namespace:/test-1-086-custom3 created logger.go:42: 07:45:12 | 1-086_validate_default_argocd_role/2-install | ArgoCD:test-1-086-custom/argocd-default-policy created logger.go:42: 07:45:12 | 1-086_validate_default_argocd_role/2-install | ArgoCD:test-1-086-custom2/argocd-default-policy-empty created logger.go:42: 07:45:12 | 1-086_validate_default_argocd_role/2-install | ArgoCD:test-1-086-custom3/argocd-default-policy-admin created logger.go:42: 07:57:12 | 1-086_validate_default_argocd_role/2-install | test step failed 2-install case.go:361: failed in step 2-install case.go:363: --- ArgoCD:test-1-086-custom/argocd-default-policy +++ ArgoCD:test-1-086-custom/argocd-default-policy @@ -1,12 +1,109 @@ apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: + finalizers: + - argoproj.io/finalizer + managedFields: + - apiVersion: argoproj.io/v1alpha1 + fieldsType: FieldsV1 + fieldsV1: + f:spec: + .: {} + f:server: + .: {} + f:route: + .: {} + f:enabled: {} + f:sso: + .: {} + f:verifyTLS: {} + manager: kubectl-kuttl + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:finalizers: + .: {} + v:"argoproj.io/finalizer": {} + manager: manager + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:applicationController: {} + f:applicationSetController: {} + f:conditions: {} + f:phase: {} + f:redis: {} + f:repo: {} + f:server: {} + f:sso: {} + manager: manager + operation: Update + subresource: status + time: "2025-08-11T07:45:28Z" name: argocd-default-policy namespace: test-1-086-custom spec: + controller: + processors: {} + sharding: {} + grafana: + enabled: false + ingress: + enabled: false + route: + enabled: false + ha: + enabled: false + initialSSHKnownHosts: {} + monitoring: + enabled: false + notifications: + enabled: false + prometheus: + enabled: false + ingress: + enabled: false + route: + enabled: false + rbac: {} + redis: {} + repo: {} server: + autoscale: + enabled: false + grpc: + ingress: + enabled: false + ingress: + enabled: false route: enabled: true + service: + type: "" + sso: + keycloak: + verifyTLS: true + tls: + ca: {} status: - phase: Available + applicationController: Unknown + applicationSetController: Unknown + conditions: + - lastTransitionTime: "2025-08-11T07:45:12Z" + message: 'illegal SSO configuration: Cannot specify SSO provider spec without + specifying SSO provider type' + reason: ErrorOccurred + status: "False" + type: Reconciled + phase: Pending + redis: Unknown + repo: Unknown + server: Unknown + sso: Failed case.go:363: resource ArgoCD:test-1-086-custom/argocd-default-policy: .status.phase: value mismatch, expected: Available != actual: Pending case.go:363: --- ArgoCD:test-1-086-custom2/argocd-default-policy-empty +++ ArgoCD:test-1-086-custom2/argocd-default-policy-empty @@ -1,12 +1,113 @@ apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: + finalizers: + - argoproj.io/finalizer + managedFields: + - apiVersion: argoproj.io/v1alpha1 + fieldsType: FieldsV1 + fieldsV1: + f:spec: + .: {} + f:rbac: + .: {} + f:defaultPolicy: {} + f:server: + .: {} + f:route: + .: {} + f:enabled: {} + f:sso: + .: {} + f:verifyTLS: {} + manager: kubectl-kuttl + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:finalizers: + .: {} + v:"argoproj.io/finalizer": {} + manager: manager + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:applicationController: {} + f:applicationSetController: {} + f:conditions: {} + f:phase: {} + f:redis: {} + f:repo: {} + f:server: {} + f:sso: {} + manager: manager + operation: Update + subresource: status + time: "2025-08-11T07:57:11Z" name: argocd-default-policy-empty namespace: test-1-086-custom2 spec: + controller: + processors: {} + sharding: {} + grafana: + enabled: false + ingress: + enabled: false + route: + enabled: false + ha: + enabled: false + initialSSHKnownHosts: {} + monitoring: + enabled: false + notifications: + enabled: false + prometheus: + enabled: false + ingress: + enabled: false + route: + enabled: false + rbac: + defaultPolicy: "" + redis: {} + repo: {} server: + autoscale: + enabled: false + grpc: + ingress: + enabled: false + ingress: + enabled: false route: enabled: true + service: + type: "" + sso: + keycloak: + verifyTLS: true + tls: + ca: {} status: - phase: Available + applicationController: Unknown + applicationSetController: Unknown + conditions: + - lastTransitionTime: "2025-08-11T07:45:12Z" + message: 'illegal SSO configuration: Cannot specify SSO provider spec without + specifying SSO provider type' + reason: ErrorOccurred + status: "False" + type: Reconciled + phase: Pending + redis: Unknown + repo: Unknown + server: Unknown + sso: Failed case.go:363: resource ArgoCD:test-1-086-custom2/argocd-default-policy-empty: .status.phase: value mismatch, expected: Available != actual: Pending case.go:363: --- ArgoCD:test-1-086-custom3/argocd-default-policy-admin +++ ArgoCD:test-1-086-custom3/argocd-default-policy-admin @@ -1,12 +1,113 @@ apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: + finalizers: + - argoproj.io/finalizer + managedFields: + - apiVersion: argoproj.io/v1alpha1 + fieldsType: FieldsV1 + fieldsV1: + f:spec: + .: {} + f:rbac: + .: {} + f:defaultPolicy: {} + f:server: + .: {} + f:route: + .: {} + f:enabled: {} + f:sso: + .: {} + f:verifyTLS: {} + manager: kubectl-kuttl + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:finalizers: + .: {} + v:"argoproj.io/finalizer": {} + manager: manager + operation: Update + time: "2025-08-11T07:45:12Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:applicationController: {} + f:applicationSetController: {} + f:conditions: {} + f:phase: {} + f:redis: {} + f:repo: {} + f:server: {} + f:sso: {} + manager: manager + operation: Update + subresource: status + time: "2025-08-11T07:57:11Z" name: argocd-default-policy-admin namespace: test-1-086-custom3 spec: + controller: + processors: {} + sharding: {} + grafana: + enabled: false + ingress: + enabled: false + route: + enabled: false + ha: + enabled: false + initialSSHKnownHosts: {} + monitoring: + enabled: false + notifications: + enabled: false + prometheus: + enabled: false + ingress: + enabled: false + route: + enabled: false + rbac: + defaultPolicy: role:admin + redis: {} + repo: {} server: + autoscale: + enabled: false + grpc: + ingress: + enabled: false + ingress: + enabled: false route: enabled: true + service: + type: "" + sso: + keycloak: + verifyTLS: true + tls: + ca: {} status: - phase: Available + applicationController: Unknown + applicationSetController: Unknown + conditions: + - lastTransitionTime: "2025-08-11T07:45:12Z" + message: 'illegal SSO configuration: Cannot specify SSO provider spec without + specifying SSO provider type' + reason: ErrorOccurred + status: "False" + type: Reconciled + phase: Pending + redis: Unknown + repo: Unknown + server: Unknown + sso: Failed case.go:363: resource ArgoCD:test-1-086-custom3/argocd-default-policy-admin: .status.phase: value mismatch, expected: Available != actual: Pending case.go:363: configmaps "argocd-rbac-cm" not found case.go:363: configmaps "argocd-rbac-cm" not found case.go:363: configmaps "argocd-rbac-cm" not found logger.go:42: 07:57:12 | 1-086_validate_default_argocd_role | skipping kubernetes event logging logger.go:42: 07:57:13 | 1-086_validate_default_argocd_role | Deleting namespace: kuttl-test-prime-leech === CONT kuttl/harness/1-085_validate_dynamic_plugin_installation logger.go:42: 07:57:13 | 1-085_validate_dynamic_plugin_installation | Creating namespace: kuttl-test-daring-eagle logger.go:42: 07:57:13 | 1-085_validate_dynamic_plugin_installation/1-install-dynamic-plugin | starting test step 1-install-dynamic-plugin logger.go:42: 07:57:13 | 1-085_validate_dynamic_plugin_installation/1-install-dynamic-plugin | running command: [sh -c set -eo pipefail # Get CSV name and also OCP version. csv_name=$(oc get csv -n openshift-gitops-operator | awk '/gitops-operator/ {print $1}') ocp_version=$(oc version | awk '/Server Version/ {split($3,a,"-"); print a[1]}') if [[ ${ocp_version} =~ "4.15" ]]; then exit 0 fi # Patch the CSV to add the necessary env key:value for Dynamic Plugin oc patch csv "${csv_name}" -n openshift-gitops-operator \ --type='json' \ -p='[{ "op": "add", "path": "/spec/install/spec/deployments/0/spec/template/spec/containers/0/env/-", "value": { "name": "DYNAMIC_PLUGIN_START_OCP_VERSION", "value": "'${ocp_version}'" } }]' # Sleep 10 seconds, so the resources are launched before next assert step. sleep 5 exit 0 ] logger.go:42: 07:57:13 | 1-085_validate_dynamic_plugin_installation/1-install-dynamic-plugin | clusterserviceversion.operators.coreos.com/openshift-gitops-operator.v1.17.0 patched I0811 07:57:19.597434 192 request.go:655] Throttling request took 1.014074751s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/performance.openshift.io/v1alpha1?timeout=32s logger.go:42: 07:57:21 | 1-085_validate_dynamic_plugin_installation/1-install-dynamic-plugin | test step completed 1-install-dynamic-plugin logger.go:42: 07:57:21 | 1-085_validate_dynamic_plugin_installation/2- | starting test step 2- logger.go:42: 07:57:24 | 1-085_validate_dynamic_plugin_installation/2- | test step completed 2- logger.go:42: 07:57:24 | 1-085_validate_dynamic_plugin_installation | skipping kubernetes event logging logger.go:42: 07:57:24 | 1-085_validate_dynamic_plugin_installation | Deleting namespace: kuttl-test-daring-eagle === CONT kuttl/harness/1-084_validate_prune_templates 2025/08/11 07:57:24 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-084_validate_prune_templates/01-assert.yaml 2025/08/11 07:57:24 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-084_validate_prune_templates/01-create-ns-managed-by.yaml 2025/08/11 07:57:24 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-084_validate_prune_templates/02-prune-duplicateGVK-resource.yaml 2025/08/11 07:57:24 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-084_validate_prune_templates/03-errors.yaml 2025/08/11 07:57:24 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-084_validate_prune_templates/04-delete.yaml logger.go:42: 07:57:24 | 1-084_validate_prune_templates | Creating namespace: kuttl-test-flowing-oriole logger.go:42: 07:57:24 | 1-084_validate_prune_templates/1-create-ns-managed-by | starting test step 1-create-ns-managed-by logger.go:42: 07:57:27 | 1-084_validate_prune_templates/1-create-ns-managed-by | test step completed 1-create-ns-managed-by logger.go:42: 07:57:27 | 1-084_validate_prune_templates/2-prune-duplicateGVK-resource | starting test step 2-prune-duplicateGVK-resource I0811 07:57:29.629528 192 request.go:655] Throttling request took 2.523857814s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/ingress.operator.openshift.io/v1?timeout=32s logger.go:42: 07:57:29 | 1-084_validate_prune_templates/2-prune-duplicateGVK-resource | test step completed 2-prune-duplicateGVK-resource logger.go:42: 07:57:29 | 1-084_validate_prune_templates/3- | starting test step 3- logger.go:42: 07:57:32 | 1-084_validate_prune_templates/3- | test step completed 3- logger.go:42: 07:57:32 | 1-084_validate_prune_templates/4-delete | starting test step 4-delete logger.go:42: 07:57:35 | 1-084_validate_prune_templates/4-delete | test step completed 4-delete logger.go:42: 07:57:35 | 1-084_validate_prune_templates | skipping kubernetes event logging logger.go:42: 07:57:35 | 1-084_validate_prune_templates | Deleting namespace: kuttl-test-flowing-oriole === CONT kuttl/harness/1-078_validate_default_argocd_consoleLink logger.go:42: 07:57:35 | 1-078_validate_default_argocd_consoleLink | Creating namespace: kuttl-test-ace-monkfish logger.go:42: 07:57:35 | 1-078_validate_default_argocd_consoleLink/1- | starting test step 1- logger.go:42: 07:57:38 | 1-078_validate_default_argocd_consoleLink/1- | test step completed 1- logger.go:42: 07:57:38 | 1-078_validate_default_argocd_consoleLink/2-add_env | starting test step 2-add_env logger.go:42: 07:57:38 | 1-078_validate_default_argocd_consoleLink/2-add_env | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator DISABLE_DEFAULT_ARGOCD_CONSOLELINK=true elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": "true"}]}}}' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": "true"}]}}}' fi ] logger.go:42: 07:57:38 | 1-078_validate_default_argocd_consoleLink/2-add_env | subscription.operators.coreos.com/openshift-gitops-operator patched I0811 07:57:39.670372 192 request.go:655] Throttling request took 1.075298403s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/helm.openshift.io/v1beta1?timeout=32s logger.go:42: 07:58:11 | 1-078_validate_default_argocd_consoleLink/2-add_env | test step completed 2-add_env logger.go:42: 07:58:11 | 1-078_validate_default_argocd_consoleLink/3-check-env | starting test step 3-check-env logger.go:42: 07:58:11 | 1-078_validate_default_argocd_consoleLink/3-check-env | running command: [sh -c if ! [ -z $NON_OLM ]; then label_value=$(oc get deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator -o json | jq '.spec.template.spec.containers[]|select(.name=="manager")|.env[] | select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK")|.value') if ! [[ "${label_value}" == '"true"' ]]; then echo "Label value: $label_value" echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK not set" exit 1 else exit 0 fi elif [ -z $CI ]; then label_value=$(oc get subscriptions openshift-gitops-operator -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '"true"' ]]; then echo "Label value: $label_value" echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK not set" exit 1 else exit 0 fi else label_value=$(oc get subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '"true"' ]]; then echo "Label value: $label_value" echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK not set" exit 1 else exit 0 fi fi ] I0811 07:58:12.805302 192 request.go:655] Throttling request took 1.011804228s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/k8s.cni.cncf.io/v1?timeout=32s logger.go:42: 07:58:14 | 1-078_validate_default_argocd_consoleLink/3-check-env | test step completed 3-check-env logger.go:42: 07:58:14 | 1-078_validate_default_argocd_consoleLink/4-disable-env | starting test step 4-disable-env logger.go:42: 07:58:14 | 1-078_validate_default_argocd_consoleLink/4-disable-env | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator DISABLE_DEFAULT_ARGOCD_CONSOLELINK=false elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": "false"}]}}}' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": "false"}]}}}' fi ] logger.go:42: 07:58:14 | 1-078_validate_default_argocd_consoleLink/4-disable-env | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 07:58:48 | 1-078_validate_default_argocd_consoleLink/4-disable-env | test step completed 4-disable-env logger.go:42: 07:58:48 | 1-078_validate_default_argocd_consoleLink/5-check-env | starting test step 5-check-env logger.go:42: 07:58:48 | 1-078_validate_default_argocd_consoleLink/5-check-env | running command: [sh -c if ! [ -z $NON_OLM ]; then label_value=$(oc get deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator -o json | jq '.spec.template.spec.containers[]|select(.name=="manager")|.env[] | select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK")|.value') if ! [[ "${label_value}" == '"false"' ]]; then echo "Label value: $label_value" echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK set" exit 1 else exit 0 fi elif [ -z $CI ]; then label_value=$(oc get subscriptions openshift-gitops-operator -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '"false"' ]]; then echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK set" exit 1 else exit 0 fi else label_value=$(oc get subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '"false"' ]]; then echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK set" exit 1 else exit 0 fi fi ] I0811 07:58:49.572603 192 request.go:655] Throttling request took 1.026103835s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/monitoring.coreos.com/v1alpha1?timeout=32s logger.go:42: 07:58:51 | 1-078_validate_default_argocd_consoleLink/5-check-env | test step completed 5-check-env logger.go:42: 07:58:51 | 1-078_validate_default_argocd_consoleLink/6-empty-valued-env | starting test step 6-empty-valued-env logger.go:42: 07:58:51 | 1-078_validate_default_argocd_consoleLink/6-empty-valued-env | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator DISABLE_DEFAULT_ARGOCD_CONSOLELINK="" elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": ""}]}}}' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type merge --patch '{"spec": {"config": {"env": [{"name": "DISABLE_DEFAULT_ARGOCD_CONSOLELINK", "value": ""}]}}}' fi ] logger.go:42: 07:58:51 | 1-078_validate_default_argocd_consoleLink/6-empty-valued-env | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 07:58:54 | 1-078_validate_default_argocd_consoleLink/6-empty-valued-env | test step completed 6-empty-valued-env logger.go:42: 07:58:54 | 1-078_validate_default_argocd_consoleLink/7-check-env | starting test step 7-check-env logger.go:42: 07:58:54 | 1-078_validate_default_argocd_consoleLink/7-check-env | running command: [sh -c if ! [ -z $NON_OLM ]; then label_value=$(oc get deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator -o json | jq -r '.spec.template.spec.containers[]|select(.name=="manager")|.env[] | select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK")|.value') if ! [[ "${label_value}" == null ]]; then echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK is set to ${label_value}" exit 1 else exit 0 fi elif [ -z $CI ]; then label_value=$(oc get subscriptions openshift-gitops-operator -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '""' ]]; then echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK is set to ${label_value}" exit 1 else exit 0 fi else label_value=$(oc get subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="DISABLE_DEFAULT_ARGOCD_CONSOLELINK").value') if ! [[ "${label_value}" == '""' ]]; then echo "DISABLE_DEFAULT_ARGOCD_CONSOLELINK is set to ${label_value}" exit 1 else exit 0 fi fi ] logger.go:42: 07:58:57 | 1-078_validate_default_argocd_consoleLink/7-check-env | test step completed 7-check-env logger.go:42: 07:58:57 | 1-078_validate_default_argocd_consoleLink/8-remove-env | starting test step 8-remove-env logger.go:42: 07:58:57 | 1-078_validate_default_argocd_consoleLink/8-remove-env | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator DISABLE_DEFAULT_ARGOCD_CONSOLELINK=null elif [ -z $CI ]; then oc -n openshift-gitops-operator patch subscription openshift-gitops-operator --type='json' -p='[{"op": "remove", "path": "/spec/config" }]' else oc -n openshift-gitops-operator patch subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` --type='json' -p='[{"op": "remove", "path": "/spec/config" }]' fi ] logger.go:42: 07:58:57 | 1-078_validate_default_argocd_consoleLink/8-remove-env | subscription.operators.coreos.com/openshift-gitops-operator patched I0811 07:58:59.616930 192 request.go:655] Throttling request took 2.174407686s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/network.operator.openshift.io/v1?timeout=32s logger.go:42: 07:59:00 | 1-078_validate_default_argocd_consoleLink/8-remove-env | test step completed 8-remove-env logger.go:42: 07:59:00 | 1-078_validate_default_argocd_consoleLink | skipping kubernetes event logging logger.go:42: 07:59:00 | 1-078_validate_default_argocd_consoleLink | Deleting namespace: kuttl-test-ace-monkfish === CONT kuttl/harness/1-077_validate_workload_status_monitoring_alert 2025/08/11 07:59:00 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-077_validate_workload_status_monitoring_alert/01-assert.yaml 2025/08/11 07:59:00 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-077_validate_workload_status_monitoring_alert/01-install.yaml 2025/08/11 07:59:00 object detected with no GVK Kind for path /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/sequential/1-077_validate_workload_status_monitoring_alert/02-verify-alert.yaml logger.go:42: 07:59:00 | 1-077_validate_workload_status_monitoring_alert | Creating namespace: kuttl-test-ideal-moccasin logger.go:42: 07:59:00 | 1-077_validate_workload_status_monitoring_alert/1-install | starting test step 1-install logger.go:42: 07:59:03 | 1-077_validate_workload_status_monitoring_alert/1-install | test step completed 1-install logger.go:42: 07:59:03 | 1-077_validate_workload_status_monitoring_alert/2-verify-alert | starting test step 2-verify-alert logger.go:42: 07:59:05 | 1-077_validate_workload_status_monitoring_alert/2-verify-alert | test step completed 2-verify-alert logger.go:42: 07:59:05 | 1-077_validate_workload_status_monitoring_alert | skipping kubernetes event logging logger.go:42: 07:59:05 | 1-077_validate_workload_status_monitoring_alert | Deleting namespace: kuttl-test-ideal-moccasin === CONT kuttl/harness/1-035_validate_argocd_secret_repopulate logger.go:42: 07:59:05 | 1-035_validate_argocd_secret_repopulate | Creating namespace: kuttl-test-ultimate-rat logger.go:42: 07:59:05 | 1-035_validate_argocd_secret_repopulate/1- | starting test step 1- logger.go:42: 07:59:08 | 1-035_validate_argocd_secret_repopulate/1- | test step completed 1- logger.go:42: 07:59:08 | 1-035_validate_argocd_secret_repopulate/2-remove_secret_data | starting test step 2-remove_secret_data logger.go:42: 07:59:08 | 1-035_validate_argocd_secret_repopulate/2-remove_secret_data | running command: [sh -c oc patch secret/argocd-secret -p '{"data":null}' -n openshift-gitops ] logger.go:42: 07:59:08 | 1-035_validate_argocd_secret_repopulate/2-remove_secret_data | secret/argocd-secret patched I0811 07:59:10.030499 192 request.go:655] Throttling request took 1.019077876s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/image.openshift.io/v1?timeout=32s logger.go:42: 07:59:11 | 1-035_validate_argocd_secret_repopulate/2-remove_secret_data | test step completed 2-remove_secret_data logger.go:42: 07:59:11 | 1-035_validate_argocd_secret_repopulate/3-check_secret_repopulate | starting test step 3-check_secret_repopulate logger.go:42: 07:59:11 | 1-035_validate_argocd_secret_repopulate/3-check_secret_repopulate | running command: [sh -c until [[ $i -eq 20 ]] do secret_data=$(oc get secret/argocd-secret -n openshift-gitops -o custom-columns=SECRET:.data --no-headers) if [[ $secret_data == "" ]] then i=$((i+1)) sleep 6 else echo "argocd-secret was repopulated" exit 0 fi done echo "argocd-secret was not repopulated" exit 1 ] logger.go:42: 07:59:24 | 1-035_validate_argocd_secret_repopulate/3-check_secret_repopulate | argocd-secret was repopulated I0811 07:59:25.236168 192 request.go:655] Throttling request took 1.013707457s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/flowcontrol.apiserver.k8s.io/v1?timeout=32s logger.go:42: 07:59:27 | 1-035_validate_argocd_secret_repopulate/3-check_secret_repopulate | test step completed 3-check_secret_repopulate logger.go:42: 07:59:27 | 1-035_validate_argocd_secret_repopulate/4-check_controller_pod_status | starting test step 4-check_controller_pod_status logger.go:42: 07:59:27 | 1-035_validate_argocd_secret_repopulate/4-check_controller_pod_status | running command: [sh -c oc rollout status deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator --timeout=1m rollout_status=$? if [ "${rollout_status}" -ne 0 ]; then echo "openshift-gitops-operator-controller-manager deployment was not successfully rolled out" exit 1 fi exit 0 ] logger.go:42: 07:59:27 | 1-035_validate_argocd_secret_repopulate/4-check_controller_pod_status | deployment "openshift-gitops-operator-controller-manager" successfully rolled out logger.go:42: 07:59:29 | 1-035_validate_argocd_secret_repopulate/4-check_controller_pod_status | test step completed 4-check_controller_pod_status logger.go:42: 07:59:29 | 1-035_validate_argocd_secret_repopulate/5-argocd_login | starting test step 5-argocd_login logger.go:42: 07:59:29 | 1-035_validate_argocd_secret_repopulate/5-argocd_login | running command: [sh -c api_server=$(oc get routes -n openshift-gitops --field-selector metadata.name=openshift-gitops-server -o jsonpath="{.items[*]['spec.host']}") password=$(oc get secret openshift-gitops-cluster -n openshift-gitops -o jsonpath='{.data.admin\.password}' | base64 -d) output=$(argocd login $api_server --username admin --password $password --insecure) if ! [[ "${output}" =~ "'admin:login' logged in successfully" ]]; then if [[ "${output}" == *"rpc error: code = Unknown desc = server.secretkey is missing" ]]; then echo "server.secretkey is missing" exit 1 fi fi exit 0 ] logger.go:42: 08:00:00 | 1-035_validate_argocd_secret_repopulate/5-argocd_login | {"level":"fatal","msg":"context deadline exceeded","time":"2025-08-11T08:00:00Z"} I0811 08:00:01.394481 192 request.go:655] Throttling request took 1.013348305s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/admissionregistration.k8s.io/v1?timeout=32s logger.go:42: 08:00:03 | 1-035_validate_argocd_secret_repopulate/5-argocd_login | test step completed 5-argocd_login logger.go:42: 08:00:03 | 1-035_validate_argocd_secret_repopulate | skipping kubernetes event logging logger.go:42: 08:00:03 | 1-035_validate_argocd_secret_repopulate | Deleting namespace: kuttl-test-ultimate-rat === CONT kuttl/harness/1-056_validate_managed-by logger.go:42: 08:00:03 | 1-056_validate_managed-by | Creating namespace: kuttl-test-smart-ladybird logger.go:42: 08:00:03 | 1-056_validate_managed-by/1-install | starting test step 1-install logger.go:42: 08:00:06 | 1-056_validate_managed-by/1-install | Namespace:/test-1-56-target created logger.go:42: 08:00:06 | 1-056_validate_managed-by/1-install | Namespace:/test-1-56-custom created logger.go:42: 08:00:06 | 1-056_validate_managed-by/1-install | ArgoCD:test-1-56-target/example-argocd created logger.go:42: 08:00:42 | 1-056_validate_managed-by/1-install | test step completed 1-install logger.go:42: 08:00:42 | 1-056_validate_managed-by/2-delete | starting test step 2-delete I0811 08:00:43.701747 192 request.go:655] Throttling request took 1.022597236s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/metal3.io/v1alpha1?timeout=32s logger.go:42: 08:00:45 | 1-056_validate_managed-by/2-delete | test step completed 2-delete logger.go:42: 08:00:45 | 1-056_validate_managed-by/3-check | starting test step 3-check logger.go:42: 08:00:45 | 1-056_validate_managed-by/3-check | running command: [sh -c set -e label_value=$(oc get ns/test-1-56-custom -o go-template=$'{{index .metadata.labels "argocd.argoproj.io/managed-by"}}') echo "label value: ${label_value}" if [[ "${label_value}" == "test-1-56-target" ]]; then echo "managed-by label exists, set REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION variable to delete the label" exit 0 fi exit 1 ] logger.go:42: 08:00:45 | 1-056_validate_managed-by/3-check | label value: test-1-56-target logger.go:42: 08:00:45 | 1-056_validate_managed-by/3-check | managed-by label exists, set REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION variable to delete the label logger.go:42: 08:00:48 | 1-056_validate_managed-by/3-check | test step completed 3-check logger.go:42: 08:00:48 | 1-056_validate_managed-by/4-add_env | starting test step 4-add_env logger.go:42: 08:00:48 | 1-056_validate_managed-by/4-add_env | running command: [sh -c set -e if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION=true elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION", "value": "true"}]}}}' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type merge --patch '{"spec": {"config": {"env": [{"name": "REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION", "value": "true"}]}}}' fi ] logger.go:42: 08:00:48 | 1-056_validate_managed-by/4-add_env | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 08:00:51 | 1-056_validate_managed-by/4-add_env | test step completed 4-add_env logger.go:42: 08:00:51 | 1-056_validate_managed-by/5-check | starting test step 5-check logger.go:42: 08:00:51 | 1-056_validate_managed-by/5-check | running command: [sh -c if ! [ -z $NON_OLM ]; then label_value=$(oc get deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator -o json | jq '.spec.template.spec.containers[]|select(.name=="manager")|.env[] | select(.name=="REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION")|.value') if [ -z $label_value ]; then echo "REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION not set" exit 1 else exit 0 fi elif [ -z $CI ]; then label_value=$(oc get subscriptions openshift-gitops-operator -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION").value') if [ -z $label_value ]; then echo "REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION not set" exit 1 else exit 0 fi else label_value=$(oc get subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` -n openshift-gitops-operator -o json | jq '.spec.config.env[]|select(.name=="REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION").value') if [ -z $label_value ]; then echo "REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION not set" exit 1 else exit 0 fi fi ] I0811 08:00:53.746758 192 request.go:655] Throttling request took 2.225821866s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/events.k8s.io/v1?timeout=32s logger.go:42: 08:00:54 | 1-056_validate_managed-by/5-check | test step completed 5-check logger.go:42: 08:00:54 | 1-056_validate_managed-by/6-install | starting test step 6-install logger.go:42: 08:00:57 | 1-056_validate_managed-by/6-install | Namespace:/test-1-56-target-2 created logger.go:42: 08:00:57 | 1-056_validate_managed-by/6-install | Namespace:/test-1-56-custom-2 created logger.go:42: 08:00:57 | 1-056_validate_managed-by/6-install | ArgoCD:test-1-56-target-2/example-argocd-2 created logger.go:42: 08:01:34 | 1-056_validate_managed-by/6-install | test step completed 6-install logger.go:42: 08:01:34 | 1-056_validate_managed-by/7-delete | starting test step 7-delete I0811 08:01:36.285672 192 request.go:655] Throttling request took 1.01973277s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/olm.operatorframework.io/v1?timeout=32s logger.go:42: 08:01:38 | 1-056_validate_managed-by/7-delete | test step completed 7-delete logger.go:42: 08:01:38 | 1-056_validate_managed-by/8-remove_env | starting test step 8-remove_env logger.go:42: 08:01:38 | 1-056_validate_managed-by/8-remove_env | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION=null elif [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type json --patch '[{"op": "remove", "path": "/spec/config"}]' else oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` \ --type json --patch '[{"op": "remove", "path": "/spec/config"}]' fi ] logger.go:42: 08:01:38 | 1-056_validate_managed-by/8-remove_env | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 08:01:41 | 1-056_validate_managed-by/8-remove_env | test step completed 8-remove_env logger.go:42: 08:01:41 | 1-056_validate_managed-by/99-delete | starting test step 99-delete I0811 08:01:50.583743 192 request.go:655] Throttling request took 1.02429026s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/packages.operators.coreos.com/v1?timeout=32s logger.go:42: 08:01:52 | 1-056_validate_managed-by/99-delete | test step completed 99-delete logger.go:42: 08:01:52 | 1-056_validate_managed-by | skipping kubernetes event logging logger.go:42: 08:01:52 | 1-056_validate_managed-by | Deleting namespace: kuttl-test-smart-ladybird === CONT kuttl/harness/1-050_validate_sso logger.go:42: 08:01:52 | 1-050_validate_sso | Creating namespace: kuttl-test-top-rat logger.go:42: 08:01:52 | 1-050_validate_sso/1-install | starting test step 1-install logger.go:42: 08:01:55 | 1-050_validate_sso/1-install | ArgoCD:kuttl-test-top-rat/argocd created logger.go:42: 08:02:49 | 1-050_validate_sso/1-install | test step completed 1-install logger.go:42: 08:02:49 | 1-050_validate_sso/2-remove-spec-sso | starting test step 2-remove-spec-sso logger.go:42: 08:02:49 | 1-050_validate_sso/2-remove-spec-sso | running command: [sh -c oc patch -n $NAMESPACE argocd/argocd --type='json' -p='[{"op": "remove", "path": "/spec/sso"}]' ] logger.go:42: 08:02:49 | 1-050_validate_sso/2-remove-spec-sso | argocd.argoproj.io/argocd patched logger.go:42: 08:02:49 | 1-050_validate_sso/2-remove-spec-sso | running command: [sh -c sleep 10] I0811 08:03:00.880038 192 request.go:655] Throttling request took 1.013759386s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/samples.operator.openshift.io/v1?timeout=32s logger.go:42: 08:03:02 | 1-050_validate_sso/2-remove-spec-sso | test step completed 2-remove-spec-sso logger.go:42: 08:03:02 | 1-050_validate_sso/3-provider-keycloak-dex-spec | starting test step 3-provider-keycloak-dex-spec logger.go:42: 08:03:05 | 1-050_validate_sso/3-provider-keycloak-dex-spec | ArgoCD:kuttl-test-top-rat/argocd updated Warning: apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ logger.go:42: 08:15:06 | 1-050_validate_sso/3-provider-keycloak-dex-spec | test step failed 3-provider-keycloak-dex-spec case.go:361: failed in step 3-provider-keycloak-dex-spec case.go:363: --- ArgoCD:kuttl-test-top-rat/argocd +++ ArgoCD:kuttl-test-top-rat/argocd @@ -1,9 +1,108 @@ apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: + finalizers: + - argoproj.io/finalizer + managedFields: + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:finalizers: + .: {} + v:"argoproj.io/finalizer": {} + manager: manager + operation: Update + time: "2025-08-11T08:02:14Z" + - apiVersion: argoproj.io/v1alpha1 + fieldsType: FieldsV1 + fieldsV1: + f:spec: + .: {} + f:sso: + .: {} + f:dex: + .: {} + f:config: {} + f:provider: {} + manager: kubectl-kuttl + operation: Update + time: "2025-08-11T08:03:05Z" + - apiVersion: argoproj.io/v1beta1 + fieldsType: FieldsV1 + fieldsV1: + f:status: + f:applicationController: {} + f:applicationSetController: {} + f:conditions: {} + f:phase: {} + f:redis: {} + f:repo: {} + f:server: {} + f:sso: {} + manager: manager + operation: Update + subresource: status + time: "2025-08-11T08:15:04Z" name: argocd namespace: kuttl-test-top-rat +spec: + controller: + processors: {} + sharding: {} + grafana: + enabled: false + ingress: + enabled: false + route: + enabled: false + ha: + enabled: false + initialSSHKnownHosts: {} + monitoring: + enabled: false + notifications: + enabled: false + prometheus: + enabled: false + ingress: + enabled: false + route: + enabled: false + rbac: {} + redis: {} + repo: {} + server: + autoscale: + enabled: false + grpc: + ingress: + enabled: false + ingress: + enabled: false + route: + enabled: false + service: + type: "" + sso: + dex: + config: test + provider: keycloak + tls: + ca: {} status: - phase: Available + applicationController: Running + applicationSetController: Unknown + conditions: + - lastTransitionTime: "2025-08-11T08:03:06Z" + message: 'illegal SSO configuration: cannot supply dex configuration when requested + SSO provider is keycloak' + reason: ErrorOccurred + status: "False" + type: Reconciled + phase: Pending + redis: Running + repo: Running + server: Running sso: Failed case.go:363: resource ArgoCD:kuttl-test-top-rat/argocd: .status.phase: value mismatch, expected: Available != actual: Pending logger.go:42: 08:15:06 | 1-050_validate_sso | skipping kubernetes event logging logger.go:42: 08:15:06 | 1-050_validate_sso | Deleting namespace: kuttl-test-top-rat === CONT kuttl/harness/1-041_validate_argocd_sync_alert logger.go:42: 08:15:06 | 1-041_validate_argocd_sync_alert | Creating namespace: kuttl-test-well-heron logger.go:42: 08:15:06 | 1-041_validate_argocd_sync_alert/1- | starting test step 1- I0811 08:15:07.387400 192 request.go:655] Throttling request took 1.007043469s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/infrastructure.cluster.x-k8s.io/v1alpha5?timeout=32s logger.go:42: 08:15:09 | 1-041_validate_argocd_sync_alert/1- | test step completed 1- logger.go:42: 08:15:09 | 1-041_validate_argocd_sync_alert | skipping kubernetes event logging logger.go:42: 08:15:09 | 1-041_validate_argocd_sync_alert | Deleting namespace: kuttl-test-well-heron === CONT kuttl/harness/1-040_validate_quoted_RBAC_group_names logger.go:42: 08:15:09 | 1-040_validate_quoted_RBAC_group_names | Creating namespace: kuttl-test-assured-yak logger.go:42: 08:15:09 | 1-040_validate_quoted_RBAC_group_names/1-login_argocd_api_server | starting test step 1-login_argocd_api_server logger.go:42: 08:15:09 | 1-040_validate_quoted_RBAC_group_names/1-login_argocd_api_server | running command: [sh -c api_server=$(oc get routes -n openshift-gitops --field-selector metadata.name=openshift-gitops-server -o jsonpath="{.items[*]['spec.host']}") password=$(oc get secret openshift-gitops-cluster -n openshift-gitops -o jsonpath='{.data.admin\.password}' | base64 -d) # '--skip-test-tls' parameter was added in Feb 2025, to work around OpenShift Routes not supporting HTTP2 by default, along with Argo CD upstream bugs https://github.com/argoproj/argo-cd/issues/21764, and https://github.com/argoproj/argo-cd/issues/20121 # '--skip-test-tls' should be removed once we have resolved these issues. output=$(argocd login $api_server --username admin --password $password --insecure --skip-test-tls) if ! [[ "${output}" =~ "'admin:login' logged in successfully" ]]; then exit 1 fi exit 0 ] logger.go:42: 08:15:09 | 1-040_validate_quoted_RBAC_group_names/1-login_argocd_api_server | {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-08-11T08:15:09Z"} logger.go:42: 08:15:13 | 1-040_validate_quoted_RBAC_group_names/1-login_argocd_api_server | test step completed 1-login_argocd_api_server logger.go:42: 08:15:13 | 1-040_validate_quoted_RBAC_group_names/2-create_role | starting test step 2-create_role logger.go:42: 08:15:13 | 1-040_validate_quoted_RBAC_group_names/2-create_role | running command: [sh -c output=$(argocd proj role create default somerole) if ! [[ "$output" =~ "Role 'somerole' created" ]]; then echo "Error creating role" exit 1 fi exit 0 ] logger.go:42: 08:15:13 | 1-040_validate_quoted_RBAC_group_names/2-create_role | {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-08-11T08:15:13Z"} logger.go:42: 08:15:16 | 1-040_validate_quoted_RBAC_group_names/2-create_role | test step completed 2-create_role logger.go:42: 08:15:16 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | starting test step 3-specify_group_names logger.go:42: 08:15:16 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | running command: [sh -c output=$(argocd proj role add-group default somerole '"CN=foo,OU=bar,O=baz"') cleanup() { argocd proj role delete default somerole } trap cleanup INT TERM EXIT if ! [[ "${output}" =~ "added to role 'somerole'" ]]; then echo "Contains comma characters!" exit 1 fi ] logger.go:42: 08:15:16 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-08-11T08:15:16Z"} logger.go:42: 08:15:16 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-08-11T08:15:16Z"} logger.go:42: 08:15:17 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | Role 'somerole' deleted I0811 08:15:18.269508 192 request.go:655] Throttling request took 1.006929825s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/build.openshift.io/v1?timeout=32s logger.go:42: 08:15:20 | 1-040_validate_quoted_RBAC_group_names/3-specify_group_names | test step completed 3-specify_group_names logger.go:42: 08:15:20 | 1-040_validate_quoted_RBAC_group_names | skipping kubernetes event logging logger.go:42: 08:15:20 | 1-040_validate_quoted_RBAC_group_names | Deleting namespace: kuttl-test-assured-yak === CONT kuttl/harness/1-026-validate_backend_service_permissions logger.go:42: 08:15:20 | 1-026-validate_backend_service_permissions | Creating namespace: kuttl-test-joint-zebra logger.go:42: 08:15:20 | 1-026-validate_backend_service_permissions/1-check-backend-service | starting test step 1-check-backend-service logger.go:42: 08:15:22 | 1-026-validate_backend_service_permissions/1-check-backend-service | test step completed 1-check-backend-service logger.go:42: 08:15:22 | 1-026-validate_backend_service_permissions | skipping kubernetes event logging logger.go:42: 08:15:22 | 1-026-validate_backend_service_permissions | Deleting namespace: kuttl-test-joint-zebra === CONT kuttl/harness/1-034_validate_custom_roles logger.go:42: 08:15:22 | 1-034_validate_custom_roles | Creating namespace: kuttl-test-bold-bobcat logger.go:42: 08:15:23 | 1-034_validate_custom_roles/1-install | starting test step 1-install logger.go:42: 08:15:25 | 1-034_validate_custom_roles/1-install | Namespace:/test-1-034-custom created logger.go:42: 08:15:25 | 1-034_validate_custom_roles/1-install | ArgoCD:test-1-034-custom/argocd created logger.go:42: 08:15:25 | 1-034_validate_custom_roles/1-install | Namespace:/custom-role-namespace created logger.go:42: 08:15:26 | 1-034_validate_custom_roles/1-install | ClusterRole:/custom-argocd-role created logger.go:42: 08:16:02 | 1-034_validate_custom_roles/1-install | test step completed 1-install logger.go:42: 08:16:02 | 1-034_validate_custom_roles/2-patch-subscription | starting test step 2-patch-subscription logger.go:42: 08:16:02 | 1-034_validate_custom_roles/2-patch-subscription | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator CONTROLLER_CLUSTER_ROLE=custom-argocd-role oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator SERVER_CLUSTER_ROLE=custom-argocd-role elif ! [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'`\ --type merge --patch '{"spec": {"config": {"env": [{"name": "CONTROLLER_CLUSTER_ROLE", "value": "custom-argocd-role"},{"name": "SERVER_CLUSTER_ROLE", "value": "custom-argocd-role"}]}}}' else oc patch -n openshift-gitops-operator subscription openshift-gitops-operator \ --type merge --patch '{"spec": {"config": {"env": [{"name": "CONTROLLER_CLUSTER_ROLE", "value": "custom-argocd-role"},{"name": "SERVER_CLUSTER_ROLE", "value": "custom-argocd-role"}]}}}' fi ] logger.go:42: 08:16:02 | 1-034_validate_custom_roles/2-patch-subscription | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 08:16:02 | 1-034_validate_custom_roles/2-patch-subscription | running command: [sh -c sleep 10] I0811 08:16:13.579586 192 request.go:655] Throttling request took 1.012929342s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/machineconfiguration.openshift.io/v1?timeout=32s logger.go:42: 08:16:15 | 1-034_validate_custom_roles/2-patch-subscription | test step completed 2-patch-subscription logger.go:42: 08:16:15 | 1-034_validate_custom_roles/3- | starting test step 3- logger.go:42: 08:16:35 | 1-034_validate_custom_roles/3- | test step completed 3- logger.go:42: 08:16:35 | 1-034_validate_custom_roles/4- | starting test step 4- I0811 08:16:36.411077 192 request.go:655] Throttling request took 1.012140764s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/machine.openshift.io/v1beta1?timeout=32s logger.go:42: 08:16:38 | 1-034_validate_custom_roles/4- | test step completed 4- logger.go:42: 08:16:38 | 1-034_validate_custom_roles/5-delete | starting test step 5-delete I0811 08:16:46.494443 192 request.go:655] Throttling request took 1.010076964s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/project.openshift.io/v1?timeout=32s logger.go:42: 08:16:48 | 1-034_validate_custom_roles/5-delete | test step completed 5-delete logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | starting test step 6-revert-patch logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | running command: [sh -c if ! [ -z $NON_OLM ]; then oc set env deployment openshift-gitops-operator-controller-manager -n openshift-gitops-operator SERVER_CLUSTER_ROLE=null elif ! [ -z $CI ]; then oc patch -n openshift-gitops-operator subscription `subscription=gitops-operator- && oc get subscription --all-namespaces | grep $subscription | head -1 | awk '{print $2}'` --type json --patch='[ { "op": "remove", "path": "/spec/config" } ]' else oc patch subscription/openshift-gitops-operator -n openshift-gitops-operator --type json --patch='[ { "op": "remove", "path": "/spec/config" } ]' fi ] logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | subscription.operators.coreos.com/openshift-gitops-operator patched logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | running command: [sh -c # Loop to wait until SERVER_CLUSTER_ROLE is removed from the Argo CD server Deployment for i in {1..30}; do if oc get deployment openshift-gitops-argocd-server -n openshift-gitops -o jsonpath='{.spec.template.spec.containers[0].env}' | grep -q 'SERVER_CLUSTER_ROLE=custom-argocd-role'; then echo "Waiting for SERVER_CLUSTER_ROLE to be removed..." sleep 5 else echo "SERVER_CLUSTER_ROLE has been removed." break fi done # If after the loop the variable is still set, fail the step if oc get deployment openshift-gitops-argocd-server -n openshift-gitops -o jsonpath='{.spec.template.spec.containers[0].env}' | grep -q 'SERVER_CLUSTER_ROLE=custom-argocd-role'; then echo "ERROR: SERVER_CLUSTER_ROLE was not removed after waiting." exit 1 fi ] logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | Error from server (NotFound): deployments.apps "openshift-gitops-argocd-server" not found logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | SERVER_CLUSTER_ROLE has been removed. logger.go:42: 08:16:48 | 1-034_validate_custom_roles/6-revert-patch | Error from server (NotFound): deployments.apps "openshift-gitops-argocd-server" not found logger.go:42: 08:16:51 | 1-034_validate_custom_roles/6-revert-patch | test step completed 6-revert-patch logger.go:42: 08:16:51 | 1-034_validate_custom_roles | skipping kubernetes event logging logger.go:42: 08:16:51 | 1-034_validate_custom_roles | Deleting namespace: kuttl-test-bold-bobcat === CONT kuttl/harness/1-028_validate_run_on_infra logger.go:42: 08:16:51 | 1-028_validate_run_on_infra | Ignoring errors.yaml as it does not match file name regexp: ^(\d+)-(?:[^\.]+)(?:\.yaml)?$ logger.go:42: 08:16:51 | 1-028_validate_run_on_infra | Creating namespace: kuttl-test-boss-marmot logger.go:42: 08:16:51 | 1-028_validate_run_on_infra/1-install | starting test step 1-install logger.go:42: 08:16:51 | 1-028_validate_run_on_infra/1-install | running command: [sh -c oc patch gitopsservice cluster --type=merge --patch='{"spec": {"runOnInfra": true, "tolerations": [{"effect": "NoSchedule", "key": "infra", "value": "reserved"}]}}' ] logger.go:42: 08:16:51 | 1-028_validate_run_on_infra/1-install | gitopsservice.pipelines.openshift.io/cluster patched logger.go:42: 08:16:54 | 1-028_validate_run_on_infra/1-install | test step completed 1-install logger.go:42: 08:16:54 | 1-028_validate_run_on_infra/2-custom-argocd | starting test step 2-custom-argocd I0811 08:16:56.511944 192 request.go:655] Throttling request took 1.875334894s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/flowcontrol.apiserver.k8s.io/v1?timeout=32s logger.go:42: 08:16:57 | 1-028_validate_run_on_infra/2-custom-argocd | ArgoCD:kuttl-test-boss-marmot/argocd created logger.go:42: 08:18:04 | 1-028_validate_run_on_infra/2-custom-argocd | test step completed 2-custom-argocd logger.go:42: 08:18:04 | 1-028_validate_run_on_infra/3-change-back | starting test step 3-change-back logger.go:42: 08:18:04 | 1-028_validate_run_on_infra/3-change-back | running command: [sh -c oc patch gitopsservice cluster --type=json --patch='[{"op": "remove", "path": "/spec/tolerations"}, {"op": "remove", "path": "/spec/runOnInfra"}]' oc patch statefulset openshift-gitops-application-controller -n openshift-gitops -p '{"spec":{"replicas":0}}' ] logger.go:42: 08:18:04 | 1-028_validate_run_on_infra/3-change-back | gitopsservice.pipelines.openshift.io/cluster patched logger.go:42: 08:18:04 | 1-028_validate_run_on_infra/3-change-back | statefulset.apps/openshift-gitops-application-controller patched I0811 08:18:05.523739 192 request.go:655] Throttling request took 1.013401182s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/security.openshift.io/v1?timeout=32s logger.go:42: 08:18:07 | 1-028_validate_run_on_infra/3-change-back | test step completed 3-change-back logger.go:42: 08:18:07 | 1-028_validate_run_on_infra/4-check | starting test step 4-check logger.go:42: 08:18:10 | 1-028_validate_run_on_infra/4-check | test step completed 4-check logger.go:42: 08:18:10 | 1-028_validate_run_on_infra | skipping kubernetes event logging logger.go:42: 08:18:10 | 1-028_validate_run_on_infra | Deleting namespace: kuttl-test-boss-marmot === CONT kuttl/harness/1-020_validate_redis_ha_nonha logger.go:42: 08:18:10 | 1-020_validate_redis_ha_nonha | Creating namespace: kuttl-test-sound-mouse logger.go:42: 08:18:10 | 1-020_validate_redis_ha_nonha/1- | starting test step 1- logger.go:42: 08:18:18 | 1-020_validate_redis_ha_nonha/1- | test step completed 1- logger.go:42: 08:18:18 | 1-020_validate_redis_ha_nonha/2-enable-ha | starting test step 2-enable-ha I0811 08:18:19.726894 192 request.go:655] Throttling request took 1.026107242s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/performance.openshift.io/v1?timeout=32s logger.go:42: 08:18:21 | 1-020_validate_redis_ha_nonha/2-enable-ha | ArgoCD:openshift-gitops/openshift-gitops updated logger.go:42: 08:30:22 | 1-020_validate_redis_ha_nonha/2-enable-ha | test step failed 2-enable-ha case.go:361: failed in step 2-enable-ha case.go:363: --- Deployment:openshift-gitops/openshift-gitops-redis-ha-haproxy +++ Deployment:openshift-gitops/openshift-gitops-redis-ha-haproxy @@ -1,8 +1,430 @@ apiVersion: apps/v1 kind: Deployment metadata: + labels: + app.kubernetes.io/component: redis + app.kubernetes.io/managed-by: openshift-gitops + app.kubernetes.io/name: openshift-gitops-redis-ha-haproxy + app.kubernetes.io/part-of: argocd + managedFields: + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/component: {} + f:app.kubernetes.io/managed-by: {} + f:app.kubernetes.io/name: {} + f:app.kubernetes.io/part-of: {} + f:ownerReferences: + .: {} + k:{"uid":"8d2e93d4-859a-4024-8aed-2e5911db5c00"}: {} + f:spec: + f:progressDeadlineSeconds: {} + f:replicas: {} + f:revisionHistoryLimit: {} + f:selector: {} + f:strategy: + f:rollingUpdate: + .: {} + f:maxSurge: {} + f:maxUnavailable: {} + f:type: {} + f:template: + f:metadata: + f:labels: + .: {} + f:app.kubernetes.io/name: {} + f:spec: + f:affinity: + .: {} + f:podAntiAffinity: + .: {} + f:preferredDuringSchedulingIgnoredDuringExecution: {} + f:requiredDuringSchedulingIgnoredDuringExecution: {} + f:containers: + k:{"name":"haproxy"}: + .: {} + f:command: {} + f:env: + .: {} + k:{"name":"AUTH"}: + .: {} + f:name: {} + f:valueFrom: + .: {} + f:secretKeyRef: {} + f:image: {} + f:imagePullPolicy: {} + f:livenessProbe: + .: {} + f:failureThreshold: {} + f:httpGet: + .: {} + f:path: {} + f:port: {} + f:scheme: {} + f:initialDelaySeconds: {} + f:periodSeconds: {} + f:successThreshold: {} + f:timeoutSeconds: {} + f:name: {} + f:ports: + .: {} + k:{"containerPort":6379,"protocol":"TCP"}: + .: {} + f:containerPort: {} + f:name: {} + f:protocol: {} + f:resources: + .: {} + f:limits: + .: {} + f:cpu: {} + f:memory: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:add: {} + f:drop: {} + f:readOnlyRootFilesystem: {} + f:runAsNonRoot: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/app/config/redis/tls"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/run/haproxy"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/usr/local/etc/haproxy"}: + .: {} + f:mountPath: {} + f:name: {} + f:dnsPolicy: {} + f:initContainers: + .: {} + k:{"name":"config-init"}: + .: {} + f:args: {} + f:command: {} + f:image: {} + f:imagePullPolicy: {} + f:name: {} + f:resources: + .: {} + f:limits: + .: {} + f:cpu: {} + f:memory: {} + f:requests: + .: {} + f:cpu: {} + f:memory: {} + f:securityContext: + .: {} + f:allowPrivilegeEscalation: {} + f:capabilities: + .: {} + f:drop: {} + f:readOnlyRootFilesystem: {} + f:runAsNonRoot: {} + f:seccompProfile: + .: {} + f:type: {} + f:terminationMessagePath: {} + f:terminationMessagePolicy: {} + f:volumeMounts: + .: {} + k:{"mountPath":"/data"}: + .: {} + f:mountPath: {} + f:name: {} + k:{"mountPath":"/readonly"}: + .: {} + f:mountPath: {} + f:name: {} + f:readOnly: {} + k:{"mountPath":"/redis-initial-pass"}: + .: {} + f:mountPath: {} + f:name: {} + f:nodeSelector: {} + f:restartPolicy: {} + f:schedulerName: {} + f:securityContext: + .: {} + f:runAsNonRoot: {} + f:seccompProfile: + .: {} + f:type: {} + f:serviceAccount: {} + f:serviceAccountName: {} + f:terminationGracePeriodSeconds: {} + f:volumes: + .: {} + k:{"name":"argocd-operator-redis-tls"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"config-volume"}: + .: {} + f:configMap: + .: {} + f:defaultMode: {} + f:name: {} + f:name: {} + k:{"name":"data"}: + .: {} + f:emptyDir: {} + f:name: {} + k:{"name":"redis-initial-pass"}: + .: {} + f:name: {} + f:secret: + .: {} + f:defaultMode: {} + f:optional: {} + f:secretName: {} + k:{"name":"shared-socket"}: + .: {} + f:emptyDir: {} + f:name: {} + manager: manager + operation: Update + time: "2025-08-11T08:18:22Z" + - apiVersion: apps/v1 + fieldsType: FieldsV1 + fieldsV1: + f:metadata: + f:annotations: + .: {} + f:deployment.kubernetes.io/revision: {} + f:status: + f:availableReplicas: {} + f:conditions: + .: {} + k:{"type":"Available"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + k:{"type":"Progressing"}: + .: {} + f:lastTransitionTime: {} + f:lastUpdateTime: {} + f:message: {} + f:reason: {} + f:status: {} + f:type: {} + f:observedGeneration: {} + f:readyReplicas: {} + f:replicas: {} + f:updatedReplicas: {} + manager: kube-controller-manager + operation: Update + subresource: status + time: "2025-08-11T08:18:25Z" name: openshift-gitops-redis-ha-haproxy namespace: openshift-gitops + ownerReferences: + - apiVersion: argoproj.io/v1beta1 + blockOwnerDeletion: true + controller: true + kind: ArgoCD + name: openshift-gitops + uid: 8d2e93d4-859a-4024-8aed-2e5911db5c00 +spec: + progressDeadlineSeconds: 600 + replicas: 3 + revisionHistoryLimit: 10 + selector: + matchLabels: + app.kubernetes.io/name: openshift-gitops-redis-ha-haproxy + strategy: + rollingUpdate: + maxSurge: 25%! (MISSING)+ maxUnavailable: 25%! (MISSING)+ type: RollingUpdate + template: + metadata: + creationTimestamp: null + labels: + app.kubernetes.io/name: openshift-gitops-redis-ha-haproxy + spec: + affinity: + podAntiAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - podAffinityTerm: + labelSelector: + matchLabels: + app.kubernetes.io/name: openshift-gitops-redis-ha-haproxy + topologyKey: failure-domain.beta.kubernetes.io/zone + weight: 100 + requiredDuringSchedulingIgnoredDuringExecution: + - labelSelector: + matchLabels: + app.kubernetes.io/name: openshift-gitops-redis-ha-haproxy + topologyKey: kubernetes.io/hostname + containers: + - command: + - haproxy + - -f + - /usr/local/etc/haproxy/haproxy.cfg + env: + - name: AUTH + valueFrom: + secretKeyRef: + key: admin.password + name: openshift-gitops-redis-initial-password + image: registry.redhat.io/openshift4/ose-haproxy-router@sha256:0e74179eabfa1e1548f940879d8f6c8a72380945d015fb9373ee415a50c7b933 + imagePullPolicy: IfNotPresent + livenessProbe: + failureThreshold: 3 + httpGet: + path: /healthz + port: 8888 + scheme: HTTP + initialDelaySeconds: 5 + periodSeconds: 3 + successThreshold: 1 + timeoutSeconds: 1 + name: haproxy + ports: + - containerPort: 6379 + name: redis + protocol: TCP + resources: + limits: + cpu: 500m + memory: 256Mi + requests: + cpu: 250m + memory: 128Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + add: + - NET_BIND_SERVICE + drop: + - ALL + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /usr/local/etc/haproxy + name: data + - mountPath: /run/haproxy + name: shared-socket + - mountPath: /app/config/redis/tls + name: argocd-operator-redis-tls + dnsPolicy: ClusterFirst + initContainers: + - args: + - /readonly/haproxy_init.sh + command: + - sh + image: registry.redhat.io/openshift4/ose-haproxy-router@sha256:0e74179eabfa1e1548f940879d8f6c8a72380945d015fb9373ee415a50c7b933 + imagePullPolicy: IfNotPresent + name: config-init + resources: + limits: + cpu: 500m + memory: 256Mi + requests: + cpu: 250m + memory: 128Mi + securityContext: + allowPrivilegeEscalation: false + capabilities: + drop: + - ALL + readOnlyRootFilesystem: true + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + terminationMessagePath: /dev/termination-log + terminationMessagePolicy: File + volumeMounts: + - mountPath: /readonly + name: config-volume + readOnly: true + - mountPath: /data + name: data + - mountPath: /redis-initial-pass + name: redis-initial-pass + nodeSelector: + kubernetes.io/os: linux + restartPolicy: Always + schedulerName: default-scheduler + securityContext: + runAsNonRoot: true + seccompProfile: + type: RuntimeDefault + serviceAccount: openshift-gitops-argocd-redis-ha + serviceAccountName: openshift-gitops-argocd-redis-ha + terminationGracePeriodSeconds: 30 + volumes: + - configMap: + defaultMode: 420 + name: argocd-redis-ha-configmap + name: config-volume + - emptyDir: {} + name: shared-socket + - emptyDir: {} + name: data + - name: argocd-operator-redis-tls + secret: + defaultMode: 420 + optional: true + secretName: argocd-operator-redis-tls + - name: redis-initial-pass + secret: + defaultMode: 420 + optional: true + secretName: openshift-gitops-redis-initial-password status: - readyReplicas: 1 + availableReplicas: 3 + conditions: + - lastTransitionTime: "2025-08-11T08:18:25Z" + lastUpdateTime: "2025-08-11T08:18:25Z" + message: Deployment has minimum availability. + reason: MinimumReplicasAvailable + status: "True" + type: Available + - lastTransitionTime: "2025-08-11T08:18:22Z" + lastUpdateTime: "2025-08-11T08:18:25Z" + message: ReplicaSet "openshift-gitops-redis-ha-haproxy-555985889c" has successfully + progressed. + reason: NewReplicaSetAvailable + status: "True" + type: Progressing + observedGeneration: 1 + readyReplicas: 3 + replicas: 3 + updatedReplicas: 3 case.go:363: resource Deployment:openshift-gitops/openshift-gitops-redis-ha-haproxy: .status.readyReplicas: value mismatch, expected: 1 != actual: 3 logger.go:42: 08:30:22 | 1-020_validate_redis_ha_nonha | skipping kubernetes event logging logger.go:42: 08:30:22 | 1-020_validate_redis_ha_nonha | Deleting namespace: kuttl-test-sound-mouse === CONT kuttl/harness/1-008_validate-4.9CI-Failures logger.go:42: 08:30:22 | 1-008_validate-4.9CI-Failures | Creating namespace: kuttl-test-sunny-colt logger.go:42: 08:30:22 | 1-008_validate-4.9CI-Failures/1-install | starting test step 1-install I0811 08:30:23.169519 192 request.go:655] Throttling request took 1.024721808s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/rbac.authorization.k8s.io/v1?timeout=32s logger.go:42: 08:30:24 | 1-008_validate-4.9CI-Failures/1-install | Namespace:/source-ns created logger.go:42: 08:30:25 | 1-008_validate-4.9CI-Failures/1-install | ArgoCD:source-ns/argocd created logger.go:42: 08:30:25 | 1-008_validate-4.9CI-Failures/1-install | Namespace:/target-ns created logger.go:42: 08:31:00 | 1-008_validate-4.9CI-Failures/1-install | test step completed 1-install logger.go:42: 08:31:00 | 1-008_validate-4.9CI-Failures/2-create-rbac | starting test step 2-create-rbac I0811 08:31:01.786706 192 request.go:655] Throttling request took 1.025976192s, request: GET:https://api.ci-op-xbghwpds-d6882.cspilp.interop.ccitredhat.com:6443/apis/node.k8s.io/v1?timeout=32s logger.go:42: 08:31:03 | 1-008_validate-4.9CI-Failures/2-create-rbac | Role:source-ns/source-ns-openshift-gitops-argocd-application-controller created logger.go:42: 08:31:03 | 1-008_validate-4.9CI-Failures/2-create-rbac | RoleBinding:source-ns/source-ns-openshift-gitops-argocd-application-controller created logger.go:42: 08:31:03 | 1-008_validate-4.9CI-Failures/2-create-rbac | test step completed 2-create-rbac logger.go:42: 08:31:03 | 1-008_validate-4.9CI-Failures/3-create-app | starting test step 3-create-app logger.go:42: 08:31:06 | 1-008_validate-4.9CI-Failures/3-create-app | Application:source-ns/nginx created logger.go:42: 08:31:19 | 1-008_validate-4.9CI-Failures/3-create-app | test step completed 3-create-app logger.go:42: 08:31:19 | 1-008_validate-4.9CI-Failures | skipping kubernetes event logging logger.go:42: 08:31:19 | 1-008_validate-4.9CI-Failures | Deleting namespace: kuttl-test-sunny-colt === CONT kuttl harness.go:402: run tests finished harness.go:511: cleaning up harness.go:568: removing temp folder: "" --- FAIL: kuttl (3289.73s) --- FAIL: kuttl/harness (0.00s) --- PASS: kuttl/harness/1-002_validate_backend_service (2.90s) --- PASS: kuttl/harness/1-071_validate_node_selectors (12.25s) --- PASS: kuttl/harness/1-107_validate_redis_ssc (133.26s) --- PASS: kuttl/harness/1-106_validate_argocd_metrics_controller (9.24s) --- PASS: kuttl/harness/1-105_validate_label_selector (324.58s) --- PASS: kuttl/harness/1-101_validate_rollout_policyrules (3.02s) --- PASS: kuttl/harness/1-100_validate_rollouts_resources_creation (25.22s) --- FAIL: kuttl/harness/1-086_validate_default_argocd_role (726.87s) --- PASS: kuttl/harness/1-085_validate_dynamic_plugin_installation (11.21s) --- PASS: kuttl/harness/1-084_validate_prune_templates (11.29s) --- PASS: kuttl/harness/1-078_validate_default_argocd_consoleLink (84.74s) --- PASS: kuttl/harness/1-077_validate_workload_status_monitoring_alert (5.66s) --- PASS: kuttl/harness/1-035_validate_argocd_secret_repopulate (57.23s) --- PASS: kuttl/harness/1-056_validate_managed-by (109.19s) --- FAIL: kuttl/harness/1-050_validate_sso (793.95s) --- PASS: kuttl/harness/1-041_validate_argocd_sync_alert (2.89s) --- PASS: kuttl/harness/1-040_validate_quoted_RBAC_group_names (10.84s) --- PASS: kuttl/harness/1-026-validate_backend_service_permissions (2.93s) --- PASS: kuttl/harness/1-034_validate_custom_roles (88.54s) --- PASS: kuttl/harness/1-028_validate_run_on_infra (78.68s) --- FAIL: kuttl/harness/1-020_validate_redis_ha_nonha (731.90s) --- PASS: kuttl/harness/1-008_validate-4.9CI-Failures (57.69s) FAIL + exit_code=1 + cp ./kuttl-test.xml /logs/artifacts/junit_gitops-sequential.xml + exit 1