+ exit_code=0 + scripts/openshift-CI-kuttl-tests.sh + export CI=prow + CI=prow + go mod vendor go: downloading github.com/onsi/ginkgo/v2 v2.22.2 go: downloading github.com/onsi/gomega v1.36.2 go: downloading github.com/openshift/api v0.0.0-20240906151052-5d963dce87aa go: downloading github.com/argoproj-labs/argocd-operator v0.16.0-rc1 go: downloading github.com/operator-framework/api v0.17.5 go: downloading github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring v0.73.2 go: downloading k8s.io/api v0.33.1 go: downloading k8s.io/apimachinery v0.33.1 go: downloading k8s.io/client-go v0.33.1 go: downloading sigs.k8s.io/controller-runtime v0.21.0 go: downloading github.com/argoproj-labs/argo-rollouts-manager v0.0.6-0.20250731075119-a100fc1d88b8 go: downloading go.uber.org/zap v1.27.0 go: downloading k8s.io/apiextensions-apiserver v0.33.1 go: downloading sigs.k8s.io/yaml v1.4.0 go: downloading gotest.tools v2.2.0+incompatible go: downloading github.com/argoproj/argo-cd/v3 v3.1.5 go: downloading github.com/argoproj/gitops-engine v0.7.1-0.20250905160054-e48120133eec go: downloading golang.org/x/mod v0.25.0 go: downloading github.com/stretchr/testify v1.10.0 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/go-logr/logr v1.4.3 go: downloading github.com/hashicorp/go-version v1.7.0 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/go-logr/zapr v1.3.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.7.0 go: downloading github.com/prometheus/client_golang v1.22.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/google/uuid v1.6.1-0.20241114170450-2d3c2a9cc518 go: downloading k8s.io/kube-aggregator v0.33.1 go: downloading k8s.io/kubectl v0.33.1 go: downloading golang.org/x/net v0.41.0 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading golang.org/x/sys v0.33.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.6 go: downloading golang.org/x/term v0.32.0 go: downloading k8s.io/kube-openapi v0.0.0-20250610211856-8b98d1ed966a go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/google/gnostic-models v0.6.9 go: downloading google.golang.org/protobuf v1.36.6 go: downloading github.com/pkg/errors v0.9.1 go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/spf13/cobra v1.9.1 go: downloading golang.org/x/sync v0.15.0 go: downloading k8s.io/cli-runtime v0.33.1 go: downloading github.com/prometheus/common v0.64.0 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading golang.org/x/tools v0.33.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/fxamacker/cbor/v2 v2.8.0 go: downloading github.com/cert-manager/cert-manager v1.14.4 go: downloading github.com/golang-jwt/jwt/v5 v5.2.2 go: downloading github.com/sethvargo/go-password v0.3.1 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.16.1 go: downloading k8s.io/kubernetes v1.33.1 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/inconshreveable/mousetrap v1.1.0 go: downloading golang.org/x/text v0.26.0 go: downloading github.com/moby/term v0.5.2 go: downloading sigs.k8s.io/kustomize/api v0.19.0 go: downloading sigs.k8s.io/kustomize/kyaml v0.19.0 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/jonboulle/clockwork v0.5.0 go: downloading k8s.io/component-base v0.33.1 go: downloading k8s.io/component-helpers v0.33.1 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/gobwas/glob v0.2.3 go: downloading github.com/robfig/cron/v3 v3.0.2-0.20210106135023-bc59245fe10e go: downloading google.golang.org/grpc v1.73.0 go: downloading golang.org/x/crypto v0.39.0 go: downloading github.com/argoproj/pkg/v2 v2.0.1 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/argoproj/pkg v0.13.7-0.20250305113207-cbc37dc61de5 go: downloading github.com/chai2010/gettext-go v1.0.3 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/exponent-io/jsonpath v0.0.0-20210407135951-1de76d718b3f go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading github.com/fatih/camelcase v1.0.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading sigs.k8s.io/gateway-api v1.0.0 go: downloading github.com/redis/go-redis/v9 v9.8.0 go: downloading github.com/bmatcuk/doublestar/v4 v4.8.1 go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.16.0 go: downloading github.com/go-git/go-git/v5 v5.16.2 go: downloading github.com/google/go-github/v69 v69.2.0 go: downloading github.com/patrickmn/go-cache v2.1.1-0.20191004192108-46f407853014+incompatible go: downloading oras.land/oras-go/v2 v2.6.0 go: downloading github.com/cyphar/filepath-securejoin v0.4.1 go: downloading github.com/opencontainers/image-spec v1.1.1 go: downloading github.com/casbin/casbin/v2 v2.107.0 go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0 go: downloading github.com/casbin/govaluate v1.7.0 go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.10.1 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/dlclark/regexp2 v1.11.5 go: downloading k8s.io/apiserver v0.33.1 go: downloading github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c go: downloading github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 go: downloading github.com/Masterminds/semver/v3 v3.3.1 go: downloading github.com/golang-jwt/jwt/v4 v4.5.2 go: downloading github.com/google/go-github/v72 v72.0.0 go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f go: downloading dario.cat/mergo v1.0.2 go: downloading github.com/ProtonMail/go-crypto v1.1.6 go: downloading github.com/go-git/go-billy/v5 v5.6.2 go: downloading github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 go: downloading github.com/kevinburke/ssh_config v1.2.0 go: downloading github.com/xanzy/ssh-agent v0.3.3 go: downloading github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 go: downloading github.com/skeema/knownhosts v1.3.1 go: downloading cloud.google.com/go/compute/metadata v0.6.0 go: downloading github.com/go-redis/cache/v9 v9.0.0 go: downloading github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250519155744-55703ea1f237 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 go: downloading github.com/bombsimon/logrusr/v4 v4.1.0 go: downloading k8s.io/controller-manager v0.33.1 go: downloading github.com/distribution/reference v0.6.0 go: downloading github.com/go-errors/errors v1.5.1 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 go: downloading github.com/pjbgf/sha1cd v0.3.2 go: downloading github.com/emirpasic/gods v1.18.1 go: downloading github.com/Microsoft/go-winio v0.6.2 go: downloading github.com/klauspost/compress v1.18.0 go: downloading github.com/vmihailenco/go-tinylfu v0.2.2 go: downloading github.com/vmihailenco/msgpack/v5 v5.4.1 go: downloading github.com/moby/spdystream v0.5.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/kylelemons/godebug v1.1.0 go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f go: downloading github.com/cloudflare/circl v1.6.1 go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading go.opentelemetry.io/otel/trace v1.36.0 go: downloading github.com/vmihailenco/tagparser/v2 v2.0.0 go: downloading go.opentelemetry.io/otel v1.36.0 ++ dirname scripts/openshift-CI-kuttl-tests.sh + source scripts/e2e-common.sh + KUBECONFIG=/tmp/kubeconfig-1380015452 ++ mktemp -d + TMP_DIR=/tmp/tmp.2Vd2Om3cVH + cp /tmp/kubeconfig-1380015452 /tmp/tmp.2Vd2Om3cVH/kubeconfig + chmod 640 /tmp/tmp.2Vd2Om3cVH/kubeconfig + export KUBECONFIG=/tmp/tmp.2Vd2Om3cVH/kubeconfig + KUBECONFIG=/tmp/tmp.2Vd2Om3cVH/kubeconfig + cp /tmp/tmp.2Vd2Om3cVH/kubeconfig /go/src/github.com/redhat-developer/gitops-operator/kubeconfig + pod=openshift-gitops-operator-controller-manager ++ grep openshift-gitops-operator-controller-manager ++ head -1 ++ oc get pods --all-namespaces ++ awk '{print $2}' + oc get pods openshift-gitops-operator-controller-manager-7d9dff4bcb-hbvrt -n openshift-gitops-operator -o yaml apiVersion: v1 kind: Pod metadata: annotations: alm-examples: |- [ { "apiVersion": "argoproj.io/v1alpha1", "kind": "AppProject", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "Application", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "ApplicationSet", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "NotificationsConfiguration", "metadata": { "name": "default-notifications-configuration" }, "spec": { "templates": { "template.app-created": "email:\n subject: Application {{.app.metadata.name}} has been created.\nmessage: Application {{.app.metadata.name}} has been created.\nteams:\n title: Application {{.app.metadata.name}} has been created.", "template.app-deleted": "email:\n subject: Application {{.app.metadata.name}} has been deleted.\nmessage: Application {{.app.metadata.name}} has been deleted.\nteams:\n title: Application {{.app.metadata.name}} has been deleted.", "template.app-deployed": "email:\n subject: New version of an application {{.app.metadata.name}} is up and running.\nmessage: |\n {{if eq .serviceType \"slack\"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} is now running new version of deployments manifests.\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#18be52\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n },\n {\n \"title\": \"Revision\",\n \"value\": \"{{.app.status.sync.revision}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n },\n {\n \"name\": \"Revision\",\n \"value\": \"{{.app.status.sync.revision}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Operation Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#000080'\n title: New version of an application {{.app.metadata.name}} is up and running.", "template.app-health-degraded": "email:\n subject: Application {{.app.metadata.name}} has degraded.\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} Application {{.app.metadata.name}} has degraded.\n Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\": \"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#f4c030\",\n \"fields\": [\n {\n \"title\": \"Health Status\",\n \"value\": \"{{.app.status.health.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Health Status\",\n \"value\": \"{{.app.status.health.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#FF0000'\n title: Application {{.app.metadata.name}} has degraded.", "template.app-sync-failed": "email:\n subject: Failed to sync application {{.app.metadata.name}}.\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} The sync operation of application {{.app.metadata.name}} has failed at {{.app.status.operationState.finishedAt}} with the following error: {{.app.status.operationState.message}}\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#E96D76\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Failed at\",\n \"value\": \"{{.app.status.operationState.finishedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Operation\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#FF0000'\n title: Failed to sync application {{.app.metadata.name}}.", "template.app-sync-running": "email:\n subject: Start syncing application {{.app.metadata.name}}.\nmessage: |\n The sync operation of application {{.app.metadata.name}} has started at {{.app.status.operationState.startedAt}}.\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#0DADEA\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Started at\",\n \"value\": \"{{.app.status.operationState.startedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Operation\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n title: Start syncing application {{.app.metadata.name}}.", "template.app-sync-status-unknown": "email:\n subject: Application {{.app.metadata.name}} sync status is 'Unknown'\nmessage: |\n {{if eq .serviceType \"slack\"}}:exclamation:{{end}} Application {{.app.metadata.name}} sync is 'Unknown'.\n Application details: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}.\n {{if ne .serviceType \"slack\"}}\n {{range $c := .app.status.conditions}}\n * {{$c.message}}\n {{end}}\n {{end}}\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#E96D76\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Open Application\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n title: Application {{.app.metadata.name}} sync status is 'Unknown'", "template.app-sync-succeeded": "email:\n subject: Application {{.app.metadata.name}} has been successfully synced.\nmessage: |\n {{if eq .serviceType \"slack\"}}:white_check_mark:{{end}} Application {{.app.metadata.name}} has been successfully synced at {{.app.status.operationState.finishedAt}}.\n Sync operation details are available at: {{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true .\nslack:\n attachments: |\n [{\n \"title\": \"{{ .app.metadata.name}}\",\n \"title_link\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}\",\n \"color\": \"#18be52\",\n \"fields\": [\n {\n \"title\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\",\n \"short\": true\n },\n {\n \"title\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\",\n \"short\": true\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"title\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\",\n \"short\": true\n }\n {{end}}\n ]\n }]\n deliveryPolicy: Post\n groupingKey: \"\"\n notifyBroadcast: false\nteams:\n facts: |\n [{\n \"name\": \"Sync Status\",\n \"value\": \"{{.app.status.sync.status}}\"\n },\n {\n \"name\": \"Synced at\",\n \"value\": \"{{.app.status.operationState.finishedAt}}\"\n },\n {\n \"name\": \"Repository\",\n \"value\": \"{{.app.spec.source.repoURL}}\"\n }\n {{range $index, $c := .app.status.conditions}}\n {{if not $index}},{{end}}\n {{if $index}},{{end}}\n {\n \"name\": \"{{$c.type}}\",\n \"value\": \"{{$c.message}}\"\n }\n {{end}}\n ]\n potentialAction: |-\n [{\n \"@type\":\"OpenUri\",\n \"name\":\"Operation Details\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.context.argocdUrl}}/applications/{{.app.metadata.name}}?operation=true\"\n }]\n },\n {\n \"@type\":\"OpenUri\",\n \"name\":\"Open Repository\",\n \"targets\":[{\n \"os\":\"default\",\n \"uri\":\"{{.app.spec.source.repoURL | call .repo.RepoURLToHTTPS}}\"\n }]\n }]\n themeColor: '#000080'\n title: Application {{.app.metadata.name}} has been successfully synced" }, "triggers": { "trigger.on-created": "- description: Application is created.\n oncePer: app.metadata.name\n send:\n - app-created\n when: \"true\"", "trigger.on-deleted": "- description: Application is deleted.\n oncePer: app.metadata.name\n send:\n - app-deleted\n when: app.metadata.deletionTimestamp != nil", "trigger.on-deployed": "- description: Application is synced and healthy. Triggered once per commit.\n oncePer: app.status.operationState.syncResult.revision\n send:\n - app-deployed\n when: app.status.operationState.phase in ['Succeeded'] and app.status.health.status\n == 'Healthy'", "trigger.on-health-degraded": "- description: Application has degraded\n send:\n - app-health-degraded\n when: app.status.health.status == 'Degraded'", "trigger.on-sync-failed": "- description: Application syncing has failed\n send:\n - app-sync-failed\n when: app.status.operationState.phase in ['Error', 'Failed']", "trigger.on-sync-running": "- description: Application is being synced\n send:\n - app-sync-running\n when: app.status.operationState.phase in ['Running']", "trigger.on-sync-status-unknown": "- description: Application status is 'Unknown'\n send:\n - app-sync-status-unknown\n when: app.status.sync.status == 'Unknown'", "trigger.on-sync-succeeded": "- description: Application syncing has succeeded\n send:\n - app-sync-succeeded\n when: app.status.operationState.phase in ['Succeeded']" } } }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "Rollout", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1alpha1", "kind": "RolloutManager", "metadata": { "name": "example" }, "spec": null }, { "apiVersion": "argoproj.io/v1beta1", "kind": "ArgoCD", "metadata": { "name": "argocd" }, "spec": { "controller": { "resources": { "limits": { "cpu": "2000m", "memory": "2048Mi" }, "requests": { "cpu": "250m", "memory": "1024Mi" } } }, "ha": { "enabled": false, "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "rbac": { "defaultPolicy": "", "policy": "g, system:cluster-admins, role:admin\n", "scopes": "[groups]" }, "redis": { "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "repo": { "resources": { "limits": { "cpu": "1000m", "memory": "1024Mi" }, "requests": { "cpu": "250m", "memory": "256Mi" } } }, "resourceExclusions": "- apiGroups:\n - \"\"\n - discovery.k8s.io\n kinds:\n - Endpoints\n - EndpointSlice\n- apiGroups:\n - apiregistration.k8s.io\n kinds:\n - APIService\n- apiGroups:\n - coordination.k8s.io\n kinds:\n - Lease\n- apiGroups:\n - authentication.k8s.io\n - authorization.k8s.io\n kinds:\n - SelfSubjectReview\n - TokenReview\n - LocalSubjectAccessReview\n - SelfSubjectAccessReview\n - SelfSubjectRulesReview\n - SubjectAccessReview\n- apiGroups:\n - certificates.k8s.io\n kinds:\n - CertificateSigningRequest\n- apiGroups:\n - cert-manager.io\n kinds:\n - CertificateRequest\n- apiGroups:\n - cilium.io\n kinds:\n - CiliumIdentity\n - CiliumEndpoint\n - CiliumEndpointSlice\n- apiGroups:\n - kyverno.io\n - reports.kyverno.io\n - wgpolicyk8s.io\n kinds:\n - PolicyReport\n - ClusterPolicyReport\n - EphemeralReport\n - ClusterEphemeralReport\n - AdmissionReport\n - ClusterAdmissionReport\n - BackgroundScanReport\n - ClusterBackgroundScanReport\n - UpdateRequest\n- apiGroups:\n - tekton.dev\n clusters:\n - '*'\n kinds:\n - TaskRun\n - PipelineRun\n", "server": { "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "125m", "memory": "128Mi" } }, "route": { "enabled": true } }, "sso": { "dex": { "openShiftOAuth": true, "resources": { "limits": { "cpu": "500m", "memory": "256Mi" }, "requests": { "cpu": "250m", "memory": "128Mi" } } }, "provider": "dex" } } }, { "apiVersion": "pipelines.openshift.io/v1alpha1", "kind": "GitopsService", "metadata": { "name": "gitopsservice-sample" }, "spec": null } ] capabilities: Deep Insights console.openshift.io/plugins: '["gitops-plugin"]' containerImage: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4de51d00e08118a95debafc752a7bbcc5fe0716802e38c705e2c9d801268a49d createdAt: "2025-09-30T08:46:55Z" description: Enables teams to adopt GitOps principles for managing cluster configurations and application delivery across hybrid multi-cluster Kubernetes environments. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "false" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "true" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.2.22/23"],"mac_address":"0a:58:0a:80:02:16","gateway_ips":["10.128.2.1"],"routes":[{"dest":"10.128.0.0/14","nextHop":"10.128.2.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.2.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.2.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.2.1"}],"ip_address":"10.128.2.22/23","gateway_ip":"10.128.2.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.2.22" ], "mac": "0a:58:0a:80:02:16", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: manager olm.operatorGroup: global-operators olm.operatorNamespace: openshift-gitops-operator olm.skipRange: "" olm.targetNamespaces: "" olmcahash: 1565357dd8e01a085b1b334daedafad027b00dcd8d879e2f47fdb230e06478d4 openshift.io/scc: restricted-v2 operatorframework.io/cluster-monitoring: "true" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AnalysisRun","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AnalysisTemplate","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"AppProject","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Application","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ApplicationSet","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ArgoCD","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ArgoCD","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"ClusterAnalysisTemplate","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Experiment","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"NamespaceManagement","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"NotificationsConfiguration","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"Rollout","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"argoproj.io","kind":"RolloutManager","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"pipelines.openshift.io","kind":"GitopsService","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"openshift-gitops-operator","version":"1.18.1"}}]}' operatorframework.io/suggested-namespace: openshift-gitops-operator operators.openshift.io/infrastructure-features: '["disconnected"]' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.35.0 operators.operatorframework.io/internal-objects: '["gitopsservices.pipelines.openshift.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/redhat-developer/gitops-operator seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user support: Red Hat creationTimestamp: "2025-11-10T16:08:19Z" generateName: openshift-gitops-operator-controller-manager-7d9dff4bcb- generation: 1 labels: control-plane: gitops-operator pod-template-hash: 7d9dff4bcb name: openshift-gitops-operator-controller-manager-7d9dff4bcb-hbvrt namespace: openshift-gitops-operator ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: openshift-gitops-operator-controller-manager-7d9dff4bcb uid: c10815ae-a6a9-4c6a-8927-6cb2f88f7306 resourceVersion: "34168" uid: 1886a868-a56a-441b-8077-1824a97b61a5 spec: containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=127.0.0.1:8080 - --leader-elect command: - /usr/local/bin/manager env: - name: ARGOCD_CLUSTER_CONFIG_NAMESPACES value: openshift-gitops - name: CLUSTER_SCOPED_ARGO_ROLLOUTS_NAMESPACES value: openshift-gitops - name: OPERATOR_NAME value: gitops-operator - name: LABEL_SELECTOR - name: ENABLE_CONVERSION_WEBHOOK value: "true" - name: RELATED_IMAGE_ARGOCD_DEX_IMAGE value: registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2247a0d0f6e4aa664e65d0e6cffd14f34561c4855306fdbbf0a55b952292dfcf - name: ARGOCD_DEX_IMAGE value: registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2247a0d0f6e4aa664e65d0e6cffd14f34561c4855306fdbbf0a55b952292dfcf - name: RELATED_IMAGE_ARGOCD_KEYCLOAK_IMAGE value: registry.redhat.io/rh-sso-7/sso76-openshift-rhel8@sha256:923206112ed0873ee58edd0817dbce7bb4c9a89dc75d9b3ba2affe9aed4811de - name: ARGOCD_KEYCLOAK_IMAGE value: registry.redhat.io/rh-sso-7/sso76-openshift-rhel8@sha256:923206112ed0873ee58edd0817dbce7bb4c9a89dc75d9b3ba2affe9aed4811de - name: RELATED_IMAGE_BACKEND_IMAGE value: registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:01883ebbe93f97a8196204adcd1749280b697e4c81f80658fdba507301f033aa - name: BACKEND_IMAGE value: registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:01883ebbe93f97a8196204adcd1749280b697e4c81f80658fdba507301f033aa - name: RELATED_IMAGE_ARGOCD_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f217d2b894fc579013db354ee21aceba9290dce008ae07cff3693483314b4fa7 - name: ARGOCD_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f217d2b894fc579013db354ee21aceba9290dce008ae07cff3693483314b4fa7 - name: ARGOCD_REPOSERVER_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:f217d2b894fc579013db354ee21aceba9290dce008ae07cff3693483314b4fa7 - name: RELATED_IMAGE_ARGOCD_REDIS_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:b4f58ad83ab8719a2e102f38ee526546cd1d56428901afc3add45c9a0e2a2f12 - name: ARGOCD_REDIS_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:b4f58ad83ab8719a2e102f38ee526546cd1d56428901afc3add45c9a0e2a2f12 - name: ARGOCD_REDIS_HA_IMAGE value: registry.redhat.io/rhel9/redis-7@sha256:b4f58ad83ab8719a2e102f38ee526546cd1d56428901afc3add45c9a0e2a2f12 - name: RELATED_IMAGE_ARGOCD_REDIS_HA_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-haproxy-router@sha256:5ca16b5d521ca60461e8e85d8af09ce940d4346e51e09296c5a2bc2f2d162b5c - name: ARGOCD_REDIS_HA_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-haproxy-router@sha256:5ca16b5d521ca60461e8e85d8af09ce940d4346e51e09296c5a2bc2f2d162b5c - name: RELATED_IMAGE_GITOPS_CONSOLE_PLUGIN_IMAGE value: registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fe57b69fc1570f7ea28530a67ceb44a58537dec419e7d5aa77e8e13fa61cccfc - name: GITOPS_CONSOLE_PLUGIN_IMAGE value: registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:fe57b69fc1570f7ea28530a67ceb44a58537dec419e7d5aa77e8e13fa61cccfc - name: RELATED_IMAGE_ARGOCD_EXTENSION_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:1a4438daf2a66905d24d63a9ac910700da185094109a415af41741191fcc35b8 - name: ARGOCD_EXTENSION_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:1a4438daf2a66905d24d63a9ac910700da185094109a415af41741191fcc35b8 - name: RELATED_IMAGE_ARGO_ROLLOUTS_IMAGE value: registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:fd267dc31d61ecaf8e6d5211990f0a48ff52b49ff0730d9de7158ff5e781c0e0 - name: ARGO_ROLLOUTS_IMAGE value: registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:fd267dc31d61ecaf8e6d5211990f0a48ff52b49ff0730d9de7158ff5e781c0e0 - name: RELATED_IMAGE_MUST_GATHER_IMAGE value: registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7f182a6a714a8ce15622e19ac2b2beb2c8fd972da88b6835cdd9a6a69829be0d - name: RELATED_IMAGE_KUBE_RBAC_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:fa0acefda43e309e7f9f31f5247c933d0b868ff1573ece2f38e0549d7e2ec942 - name: ARGOCD_PRINCIPAL_IMAGE value: registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:d17069d475959a5fca31dc4cd2c2dce4f3d895f2c2b97906261791674a889079 - name: OPERATOR_CONDITION_NAME value: openshift-gitops-operator.v1.18.1 image: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4de51d00e08118a95debafc752a7bbcc5fe0716802e38c705e2c9d801268a49d imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: manager ports: - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true runAsNonRoot: true runAsUser: 1000740000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9mlsb readOnly: true - args: - --secure-listen-address=0.0.0.0:8443 - --upstream=http://127.0.0.1:8080 - --tls-cert-file=/etc/tls/private/tls.crt - --tls-private-key-file=/etc/tls/private/tls.key - --logtostderr=true - --allow-paths=/metrics - --http2-disable env: - name: OPERATOR_CONDITION_NAME value: openshift-gitops-operator.v1.18.1 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:fa0acefda43e309e7f9f31f5247c933d0b868ff1573ece2f38e0549d7e2ec942 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: metrics protocol: TCP resources: limits: cpu: 500m memory: 128Mi requests: cpu: 1m memory: 15Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000740000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/tls/private name: kube-rbac-proxy-tls readOnly: true - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9mlsb readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openshift-gitops-operator-controller-manager-dockercfg-nhs6q nodeName: ip-10-0-121-34.ec2.internal preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000740000 runAsNonRoot: true seLinuxOptions: level: s0:c27,c19 seccompProfile: type: RuntimeDefault serviceAccount: openshift-gitops-operator-controller-manager serviceAccountName: openshift-gitops-operator-controller-manager terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: kube-rbac-proxy-tls secret: defaultMode: 420 secretName: kube-rbac-proxy-tls - name: apiservice-cert secret: defaultMode: 420 items: - key: tls.crt path: apiserver.crt - key: tls.key path: apiserver.key secretName: openshift-gitops-operator-controller-manager-service-cert - name: webhook-cert secret: defaultMode: 420 items: - key: tls.crt path: tls.crt - key: tls.key path: tls.key secretName: openshift-gitops-operator-controller-manager-service-cert - name: kube-api-access-9mlsb projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2025-11-10T16:08:30Z" observedGeneration: 1 status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-11-10T16:08:19Z" observedGeneration: 1 status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-11-10T16:08:30Z" observedGeneration: 1 status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-11-10T16:08:30Z" observedGeneration: 1 status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-11-10T16:08:19Z" observedGeneration: 1 status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 1m memory: 15Mi containerID: cri-o://ecfe872d4fc28c115ac707acdd451fe6492353cc850fbc9448468935a3067b73 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:fa0acefda43e309e7f9f31f5247c933d0b868ff1573ece2f38e0549d7e2ec942 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy@sha256:570d9cef15d9ea55a04f0d1ba895451f61fd162ac19a5d121176b6e06c411c9f lastState: {} name: kube-rbac-proxy ready: true resources: limits: cpu: 500m memory: 128Mi requests: cpu: 1m memory: 15Mi restartCount: 0 started: true state: running: startedAt: "2025-11-10T16:08:30Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000740000 uid: 1000740000 volumeMounts: - mountPath: /etc/tls/private name: kube-rbac-proxy-tls readOnly: true recursiveReadOnly: Disabled - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9mlsb readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://4eb28caceff768edfce6f7bd60008cc589f2424aa72d9709d3c43871a554d739 image: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4de51d00e08118a95debafc752a7bbcc5fe0716802e38c705e2c9d801268a49d imageID: registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:4de51d00e08118a95debafc752a7bbcc5fe0716802e38c705e2c9d801268a49d lastState: {} name: manager ready: true resources: {} restartCount: 0 started: true state: running: startedAt: "2025-11-10T16:08:22Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000740000 uid: 1000740000 volumeMounts: - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9mlsb readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.121.34 hostIPs: - ip: 10.0.121.34 observedGeneration: 1 phase: Running podIP: 10.128.2.22 podIPs: - ip: 10.128.2.22 qosClass: Burstable startTime: "2025-11-10T16:08:19Z" + subscription=gitops-operator- ++ oc get subscription --all-namespaces ++ grep gitops-operator- ++ head -1 ++ awk '{print $2}' + oc get subscription -n openshift-gitops-operator NAME PACKAGE SOURCE CHANNEL openshift-gitops-operator openshift-gitops-operator redhat-operators latest + oc wait --for=condition=Ready -n openshift-gitops pod --timeout=15m -l 'app.kubernetes.io/name in (cluster,openshift-gitops-application-controller,openshift-gitops-applicationset-controller,openshift-gitops-dex-server,openshift-gitops-redis,openshift-gitops-repo-server,openshift-gitops-server)' pod/cluster-7c7f464f94-gw4nh condition met pod/openshift-gitops-application-controller-0 condition met pod/openshift-gitops-applicationset-controller-5b76d67cc-s58wh condition met pod/openshift-gitops-dex-server-85ddcc9f8b-9bnwv condition met pod/openshift-gitops-redis-5fc6b79b69-k292c condition met pod/openshift-gitops-repo-server-6f969cd85c-z4v2m condition met pod/openshift-gitops-server-78b845cb9f-bbxqw condition met + oc create ns test-argocd namespace/test-argocd created + cat + oc apply -f - Warning: ArgoCD v1alpha1 version is deprecated and will be converted to v1beta1 automatically. Moving forward, please use v1beta1 as the ArgoCD API version. argocd.argoproj.io/argocd created + sleep 60s + oc get pods -n test-argocd NAME READY STATUS RESTARTS AGE argocd-application-controller-0 1/1 Running 0 59s argocd-redis-6b656bfdfc-nh9m8 1/1 Running 0 59s argocd-repo-server-7486fdd46-4fntp 1/1 Running 0 59s argocd-server-768667676d-ntxp2 1/1 Running 0 59s + oc wait --for=condition=Ready -n test-argocd pod --timeout=15m -l 'app.kubernetes.io/name in (argocd-application-controller,argocd-redis,argocd-repo-server,argocd-server)' pod/argocd-application-controller-0 condition met pod/argocd-redis-6b656bfdfc-nh9m8 condition met pod/argocd-repo-server-7486fdd46-4fntp condition met pod/argocd-server-768667676d-ntxp2 condition met + echo '>> Running tests on prow' >> Running tests on prow + unset CI + make ginkgo go: creating new go.mod: module tmp Downloading github.com/onsi/ginkgo/v2/ginkgo@v2.22.2 go: downloading golang.org/x/tools v0.28.0 + ./bin/ginkgo -v --trace --junit-report=openshift-gitops-sequential-e2e.xml -r ./test/openshift/e2e/ginkgo/sequential Running Suite: Sequential Suite - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential ========================================================================================================================== Random Seed: 1762791046 Will run 50 of 50 specs ------------------------------ [BeforeSuite]  /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:42 [BeforeSuite] PASSED [0.000 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-064_validate_tcp_reset_error_test verifies that argocd cli app manifests command will succesfully retrieve app manifests, and tcp reset error will not occur /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:55 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying openshift-gitops Argo CD instance is available @ 11/10/25 16:11:40.382 ArgoCD status is now Available STEP: creating Argo CD Application in openshift-gitops namespace @ 11/10/25 16:11:50.458 STEP: verifying test-1-27-custom NS is created and is managed by openshift-gitops, and Application deploys successfully @ 11/10/25 16:11:50.531 Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object exists in ExistByName: test-1-27-custom Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by Expected: openshift-gitops / Actual: openshift-gitops HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Argo CD instance deployed by Argo CD becomes available @ 11/10/25 16:12:00.875 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a new simple Argo CD Application which deploys a simple guestbook app. The Application is defined in 'test-1-27-custom namespace'. That namespace is also where the guestbook application resources are deployed. @ 11/10/25 16:12:36.316 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Progressing / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: verifying we can log in to Argo CD via CLI @ 11/10/25 16:12:46.572 executing command [argocd login openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com --username admin --password JsITE2xqO6PvYMGXHjLFzQy1krAUw7D0 --insecure --skip-test-tls] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:12:46Z"} 'admin:login' logged in successfully Context 'openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com' updated STEP: retrieving the Argo CD app manifests via CLI, and verifying the command succeeds and that there is no 'TCP reset error' error @ 11/10/25 16:12:47.651 executing command: [argocd app manifests 1-27-argocd --source git --revision HEAD] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:12:47Z"} --- apiVersion: v1 kind: Namespace metadata: labels: app.kubernetes.io/instance: 1-27-argocd argocd.argoproj.io/managed-by: openshift-gitops name: test-1-27-custom --- apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: labels: app.kubernetes.io/instance: 1-27-argocd name: argocd namespace: test-1-27-custom • [79.546 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-109_validate_reencrypt_termination_policy ensure the openshift-gitops default argo cd server route has expected TLS Config values: insecure redirect and reencrypt, and the route ingress is sucessfully admitted /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:22 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: ensuring that default openshift-gitops has expecter route settings and an admitted ingress @ 11/10/25 16:12:58.775 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server HaveAdmittedIngress - value: true • [20.913 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-050_validate_sso ensures Dex/Keycloak SSO can be enabled and disabled on a namespace-scoped Argo CD instance /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:48 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating a new Argo CD instance with dex and openshift oauth enabled @ 11/10/25 16:13:19.677 STEP: verifying Argo CD is available and Dex is running @ 11/10/25 16:13:19.727 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available HaveSSOStatus: expected: Running / actual: Running Object exists in ExistByName: argocd-dex-server Deployment argocd-dex-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-dex-server STEP: disabling SSO @ 11/10/25 16:13:55.457 STEP: verifying that Argo CD becomes available after disabling SSO, and SSO is disabled @ 11/10/25 16:14:02.531 ArgoCD status is now Available HaveSSOStatus: expected: Unknown / actual: Unknown STEP: verifying dex resources no longer exist @ 11/10/25 16:14:12.652 • [113.982 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-035-validate_argocd_secret_repopulate verifies 'argocd-secret' secret is regenerated and we are able to login using that Secret /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:36 Deleting Namespace gitops-e2e-test-c46ace83-5925 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: checking OpenShift GitOps ArgoCD instance is available @ 11/10/25 16:15:33.602 ArgoCD status is now Available STEP: removing data from argocd-secret, to check that it is regenerated @ 11/10/25 16:15:43.717 STEP: verifying that Secret repopulates @ 11/10/25 16:15:43.785 ArgoCD status is now Available STEP: verifying operator Deployment is ready @ 11/10/25 16:15:56.904 Deployment openshift-gitops-operator-controller-manager - HaveReadyReplicas: expected: 1 actual: 1 executing command [argocd login openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com --username admin --password JsITE2xqO6PvYMGXHjLFzQy1krAUw7D0 --insecure --skip-test-tls] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:15:57Z"} 'admin:login' logged in successfully Context 'openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com' updated • [54.783 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-006_validate_machine_config verifies that repo server replicas can be modified via .spec.repo.replicas /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:56 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: setting the repo server replicas to 2 on openshift-gitops Argo CD @ 11/10/25 16:16:08.326 STEP: creating an Argo CD Application targeting the Argo CD namespace @ 11/10/25 16:16:15.441 STEP: waiting for Argo CD to become available after the repo server change we made @ 11/10/25 16:16:15.502 ArgoCD status is now Available STEP: verifying deployment and statefulset have expected number of replicas, including the repo server which should have 2 @ 11/10/25 16:16:25.57 Object exists in ExistByName: openshift-gitops-server Deployment openshift-gitops-server - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-redis Deployment openshift-gitops-redis - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-redis - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-applicationset-controller Deployment openshift-gitops-applicationset-controller - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-applicationset-controller - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-repo-server Deployment openshift-gitops-repo-server - HaveReplicas: expected: 2 actual: 2 Deployment openshift-gitops-repo-server - HaveReadyReplicas: expected: 2 actual: 2 Object exists in ExistByName: openshift-gitops-application-controller StatefulSet HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 STEP: verifying the Application has deployed successfully @ 11/10/25 16:16:26.163 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: updating repo server replicas back to 1 @ 11/10/25 16:16:26.243 STEP: verifying repo server Deployment moves back to a single replica @ 11/10/25 16:16:33.308 Object exists in ExistByName: openshift-gitops-repo-server Deployment openshift-gitops-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-repo-server - HaveReadyReplicas: expected: 1 actual: 1 • [42.770 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-108_alternate_cluster_roles_cluster_scoped_instance verifies that you can add alternate namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES, and that the clusterrole and binding created by this feature can be disabled via DefaultClusterScopedRoleDisabled /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:75 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating new namespace alternate-role @ 11/10/25 16:16:51.065 STEP: adding alternate-role to ARGOCD_CLUSTER_CONFIG_NAMESPACES in Subscription @ 11/10/25 16:16:51.121 STEP: creating an ArgoCD instance in the new namespace, and waiting for it to be available @ 11/10/25 16:16:51.23 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying clusterrole is created for the new namespace @ 11/10/25 16:17:26.655 Object exists in ExistByName: argocd-alternate-role-argocd-application-controller STEP: verifying the new app controller clusterrole has the expected permissions @ 11/10/25 16:17:26.705 STEP: verifying the new server clusterrole has the expected permissions @ 11/10/25 16:17:26.705 Object exists in ExistByName: argocd-alternate-role-argocd-server STEP: verifying the expected ClusterRoleBindings exist, for the new namespce @ 11/10/25 16:17:26.742 Object exists in ExistByName: argocd-alternate-role-argocd-application-controller Object exists in ExistByName: argocd-alternate-role-argocd-server STEP: creating a test Argo CD Application that will deploy to the new namespace, from the new namepsace @ 11/10/25 16:17:26.821 STEP: verifying Argo CD is successfully able to reconcile and deploy the resources of the test Argo CD Application @ 11/10/25 16:17:26.837 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: verifying that the resources defined in the Application CR are deployed and have the expected values @ 11/10/25 16:17:31.982 Object exists in ExistByName: test-gitops-ns Object exists in ExistByName: test-gitops-pv PersistentVolume HavePhase: expected: Available actual: Available STEP: disabling defaultClusterScopedRole for ArgoCD instance @ 11/10/25 16:17:32.101 STEP: verifying that cluster-scopes roles/rolebindings are deleted after we disabled defaultClusterScopedRole @ 11/10/25 16:17:39.162 STEP: creating a new clusterrole and rolebinding to replace the one we deleted @ 11/10/25 16:18:19.398 STEP: deleting the resources that were previously created by Argo CD Application deply @ 11/10/25 16:18:19.427 STEP: verifying that Argo CD says it is not able to deploy the PV due to missing permissions @ 11/10/25 16:18:19.462 .app.status.operationStatus.message is successfully synced (all tasks run) .app.status.operationStatus.message is one or more objects failed to apply, reason: persistentvolumes is forbidden: User "system:serviceaccount:alternate-role:argocd-argocd-application-controller" cannot create resource "persistentvolumes" in API group "" at the cluster scope due to application controller sync timeout. Retrying attempt #1 at 4:18PM. STEP: adding permissions back to the clusterrole @ 11/10/25 16:18:22.493 STEP: verifying that Argo CD is again able to deploy the resources defined in the Argo CD Application @ 11/10/25 16:18:22.565 Object exists in ExistByName: test-gitops-ns Object does not exists in ExistByName: test-gitops-pv persistentvolumes "test-gitops-pv" not found Object does not exists in ExistByName: test-gitops-pv persistentvolumes "test-gitops-pv" not found Object exists in ExistByName: test-gitops-pv PersistentVolume HavePhase: expected: Available actual: Available • [112.338 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-074_validate_terminating_namespace_block ensures that if one managed namespace is stuck in deleting state -- due to a finalizer -- it does not block other managed namespaces from being reconciled /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:52 Deleting Namespace alternate-role Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating an Argo CD instance that will manage other namespaces @ 11/10/25 16:18:58.456 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready @ 11/10/25 16:18:58.558 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a ConfigMap with a finalizer, so that when the Namespace is deleted, the Namespace cannot finish deleting until the ConfigMap finalizer is removed @ 11/10/25 16:19:39.075 STEP: starting to delete the Namespace in the background. This puts the Namespace into deletion state, but it cannot finish deletion until the ConfigMap has its finalizer removed, which happens at the end of the test @ 11/10/25 16:19:39.098 STEP: creating a second managed namespace, to managed by the Argo CD instance @ 11/10/25 16:19:39.098 STEP: verifying that the operator is successfully able to grant access from the Argo CD instance to the second Namespace. That confirms that, even though the first namespace is in deletion state, that the operator is not blocked on other Namespaces @ 11/10/25 16:19:39.151 Object does not exists in ExistByName: gitops-2242-argocd-argocd-server rolebindings.rbac.authorization.k8s.io "gitops-2242-argocd-argocd-server" not found Object exists in ExistByName: gitops-2242-argocd-argocd-server Object exists in ExistByName: gitops-2242-argocd-argocd-application-controller • [69.596 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-078_validate_default_argocd_consoleLink verifies that DISABLE_DEFAULT_ARGOCD_CONSOLELINK disables the ConsoleLink, and it tolerates improper values and can be re-enabled /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:21 Deleting Namespace gitops-2242-ns-first Deleting Namespace gitops-2242-ns-main Deleting Namespace gitops-2242-ns-second Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying default openshift-gitops Argo CD and ConsoleLink exist @ 11/10/25 16:20:13.096 ArgoCD status is now Available Object exists in ExistByName: argocd STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to true in operator @ 11/10/25 16:20:23.262 STEP: verifying ConsoleLink is deleted @ 11/10/25 16:20:23.37 STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK has the value 'true' @ 11/10/25 16:21:03.794 STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to false @ 11/10/25 16:21:03.891 STEP: verifying ConsoleLink exists @ 11/10/25 16:21:04 Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object exists in ExistByName: argocd STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK is 'false' @ 11/10/25 16:21:39.47 STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to an empty value @ 11/10/25 16:21:39.549 STEP: verifying ConsoleLink continues to exist @ 11/10/25 16:21:39.66 Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK has an empty value @ 11/10/25 16:21:49.7 STEP: cleaning up operator and ensuring ConsoleLink exists @ 11/10/25 16:21:49.787 Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd • [154.902 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-101_validate_rollout_policyrules verifying Rollouts operator creates the expected policy rules /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:33 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating cluster-scoped Argo Rollouts instance in openshift-gitops RolloutManager @ 11/10/25 16:22:27.91 STEP: verifying Rollouts ClusterRole contains expected policy rules @ 11/10/25 16:22:27.948 Object exists in ExistByName: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/component Expect: argo-rollouts / Have: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/name Expect: argo-rollouts / Have: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argo-rollouts / Have: argo-rollouts • [10.753 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-085_validate_dynamic_plugin_installation enables Dynamic plugin via modifying CSV, then verifies the gitops plugin resources are installed as expected /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:37 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available executing command: [oc version] Client Version: v4.2.0-alpha.0-2015-g44b3ac2 Kustomize Version: v5.0.1 Server Version: 4.21.0-0.nightly-2025-11-05-234508 Kubernetes Version: v1.34.1 STEP: adding DYNAMIC_PLUGIN_START_OCP_VERSION to CSV operator Deployment env var list @ 11/10/25 16:22:38.947 STEP: verifying the plugin's Deployment, ConfigMap, Secret, Service, and other resources have expected values @ 11/10/25 16:22:39.044 Object exists in ExistByName: gitops-plugin Deployment gitops-plugin - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: httpd-cfg HaveLabelWithValue - Key app Expect: gitops-plugin / Have: gitops-plugin HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: gitops-plugin / Have: gitops-plugin Object exists in ExistByName: console-serving-cert Object exists in ExistByName: gitops-plugin • [11.285 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-010_validate-ootb-manage-other-namespace verifies that openshift-gitops Argo CD instance is able to manage/unmanage other namespaces via managed-by label /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:54 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating a new namespace that is managed by openshift-gitops Argo CD instance @ 11/10/25 16:22:49.934 STEP: verifying openshift-gitops Argo CD instance is available @ 11/10/25 16:22:50.032 ArgoCD status is now Available STEP: verifying that new roles/rolebindings have be created in the new namespace, that allow the Argo CD instance to manage it @ 11/10/25 16:23:00.102 Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server STEP: creating a new Argo CD application in openshift-gitops ns, targeting the new namespace @ 11/10/25 16:23:00.23 STEP: verifying that Argo CD is able to deploy to that other namespace @ 11/10/25 16:23:00.272 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Progressing / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: removing managed-by label from the other namespace @ 11/10/25 16:23:10.499 STEP: verifying Argo CD managed-by roles and rolebindings are removed from other namespace @ 11/10/25 16:23:10.555 • [61.402 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-041_validate_argocd_sync_alert verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:23 Deleting Namespace test-1-10-custom Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: checking OpenShift GitOps ArgoCD instance is available @ 11/10/25 16:24:06.413 ArgoCD status is now Available STEP: verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values @ 11/10/25 16:24:16.523 Object exists in ExistByName: gitops-operator-argocd-alerts • [35.754 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-056_validate_managed-by verifies that managed-by works as expected and that REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION will remove managed-by label when the related ArgoCD instance is deleted /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:40 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating two namespaces in managed-by relationship @ 11/10/25 16:24:27.087 STEP: creating simple Argo CD instance in test-1-56-target NS @ 11/10/25 16:24:27.195 STEP: verifying Argo CD instance is started and expected resources exist @ 11/10/25 16:24:27.238 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available Deployment example-argocd-redis - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-redis - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-server - HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 StatefulSet HaveReplicas: expected: 1 actual: 1 STEP: deleting Argo CD instance in test-1-56-target @ 11/10/25 16:25:02.921 STEP: verifying test-1-56-custom is managed by test-1-56-target @ 11/10/25 16:25:02.938 HaveLabelWithValue - Key argocd.argoproj.io/managed-by Expect: test-1-56-target / Have: test-1-56-target STEP: adding REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION=true to operator Subscription or Deployment @ 11/10/25 16:25:02.992 STEP: creating new 2 new namespaces in managed-by relationship and an Argo CD instance to manage them @ 11/10/25 16:25:03.143 STEP: verifying new Argo CD is available along with the expected resources, in the new Namespace @ 11/10/25 16:25:03.37 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available Deployment example-argocd-2-redis - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-redis - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-2-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-2-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-server - HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 StatefulSet HaveReplicas: expected: 1 actual: 1 STEP: deleting the Argo CD in new namespace @ 11/10/25 16:25:39.059 STEP: verifying Namespace test-1-56-custom-2 does not have managed-by label for deleted Argo CD namespace @ 11/10/25 16:25:39.076 STEP: removing REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION from operator Subscription or Deplyoment @ 11/10/25 16:25:39.118 STEP: removing Namespaces created during the test @ 11/10/25 16:25:39.281 • [82.855 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-071_validate_SCC_HA creates SCC and ensure HA Argo CD starts as expected /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:53 Deleting Namespace test-1-56-custom Deleting Namespace test-1-56-custom-2 Deleting Namespace test-1-56-target Deleting Namespace test-1-56-target-2 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying we are running on a cluster with at least 3 nodes. This is required for Redis HA @ 11/10/25 16:26:00.247 ExpectHasAtLeastXNodes, expected: 3 actual: 6 STEP: creating simple namespace-scoped Argo CD instance @ 11/10/25 16:26:00.39 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready @ 11/10/25 16:26:00.409 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying workload pods exist and are running @ 11/10/25 16:26:45.917 STEP: enabling HA on Argo CD @ 11/10/25 16:26:45.931 STEP: waiting for HA to be enabled on Argo CD, and Argo CD to be ready @ 11/10/25 16:26:52.989 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying workload pods exist and are running @ 11/10/25 16:28:53.76 STEP: verifying workload HA pods exist and are running @ 11/10/25 16:28:53.773 Object exists in ExistByName: argocd-redis-ha-server-1 Pod HavePhase: expected: Running actual: Running Object exists in ExistByName: argocd-redis-ha-server-2 Pod HavePhase: expected: Running actual: Running • [194.574 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-004_validate_argocd_installation verifies that default openshift-gitops Argo CD instance becomes available after modifying .spec.controller.processors.operation value /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:36 Deleting Namespace gitops-e2e-test-4d7d1434-6b2c Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying default openshift-gitops Argo CD instance is available @ 11/10/25 16:29:59.554 ArgoCD status is now Available STEP: modifying Argo CD instance app controller operation processors to 20 @ 11/10/25 16:30:09.676 STEP: verifying app controller instance becomes available @ 11/10/25 16:30:16.742 ArgoCD status is now Available • [99.885 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-071_validate_node_selectors verifies changes to GitOpsService's nodeselector, tolerations, and runOnInfra will modify Argo CD Deployments and StatefulSets /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:37 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: ensuring Deployments and StatefulSets have nodeSelector of 'kubernetes.io/os: linux' @ 11/10/25 16:30:44.434 Object exists in ExistByName: cluster Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-dex-server Object exists in ExistByName: openshift-gitops-redis Object exists in ExistByName: openshift-gitops-application-controller STEP: adding 'nodeSelector: {key1: value1}' to GitOpsService CR @ 11/10/25 16:30:44.674 Object exists in ExistByName: cluster STEP: ensuring Deployments and StatefulSets pick up the change we made to nodeSelector in GitOpsService CR @ 11/10/25 16:30:44.765 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] STEP: enabling runOnInfra and setting various tolerations on GitOpsService @ 11/10/25 16:30:48.064 STEP: ensuring Deployments and StatefulSets pick up the change to nodeSelector and tolerations @ 11/10/25 16:30:48.118 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [{infra reserved NoSchedule }] STEP: removing all our previous changes from GitOpsService @ 11/10/25 16:30:51.665 STEP: ensuring Deployments and StatefulSets have the nodeSelector and tolerations removed @ 11/10/25 16:30:51.717 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule }] actual: [] Object does not exists in ExistByName: openshift-gitops-application-controller statefulsets.apps "openshift-gitops-application-controller" not found Object exists in ExistByName: openshift-gitops-application-controller StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 • [49.862 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-036_validate_role_rolebinding_for_source_namespace verifies that ArgoCD CR '.spec.sourceNamespaces' field wildcard-matching matches and manages only namespaces which match the wildcard /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:55 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating test NS @ 11/10/25 16:31:34.259 STEP: creating Argo CD instance in default NS, with 'test' sourceNamespace only @ 11/10/25 16:31:34.311 STEP: verifying Argo CD instance starts managing the namespace via managed-by-cluster-argocd label @ 11/10/25 16:31:34.355 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace @ 11/10/25 16:31:37.455 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: creating test-1 and dev NS @ 11/10/25 16:31:37.53 STEP: updating Argo CD sourceNamespaces to test*, which should match test-1 and test but not dev @ 11/10/25 16:31:37.641 STEP: verifying test-1 NS becomes managed, and expected role/rolebindings exist in test* namespaces but not dev @ 11/10/25 16:31:44.704 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace @ 11/10/25 16:31:44.762 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: verifying Role/RoleBinding for example-argocd_test-1 in test-1 namespace @ 11/10/25 16:31:44.847 Object exists in ExistByName: example-argocd_test-1 Object exists in ExistByName: example-argocd_test-1 STEP: creating a new test-2 NS @ 11/10/25 16:32:04.923 STEP: verifying the test-2 namespace becomes managed by the argo cd instance, and has the expected role/rolebinding @ 11/10/25 16:32:04.997 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test-2 in test-2 namespace @ 11/10/25 16:32:10.112 Object exists in ExistByName: example-argocd_test-2 Object exists in ExistByName: example-argocd_test-2 STEP: adding ALL namespaces ('*') to source namespaces of Argo CD instance @ 11/10/25 16:32:10.2 STEP: verifying test, test-1, test-2, and dev are all managed and have the expected roles @ 11/10/25 16:32:17.271 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace @ 11/10/25 16:32:57.519 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: verifying Role/RoleBinding for example-argocd_test-1 in test-1 namespace @ 11/10/25 16:32:57.62 Object exists in ExistByName: example-argocd_test-1 Object exists in ExistByName: example-argocd_test-1 STEP: verifying Role/RoleBinding for example-argocd_test-2 in test-2 namespace @ 11/10/25 16:32:57.711 Object exists in ExistByName: example-argocd_test-2 Object exists in ExistByName: example-argocd_test-2 STEP: verifying Role/RoleBinding for example-argocd_dev in dev namespace @ 11/10/25 16:32:57.801 Object exists in ExistByName: example-argocd_dev Object exists in ExistByName: example-argocd_dev STEP: setting Argo CD instance sourceNamespaces to 'test-ns*' and 'dev-ns*' @ 11/10/25 16:32:57.891 STEP: creating test-ns-1, dev-ns-1, and other-ns namespaces @ 11/10/25 16:33:04.966 STEP: verifying test-ns-1 and dev-ns-1 are managed, but other-ns isn't @ 11/10/25 16:33:05.186 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test-ns-1 in test-ns-1 namespace @ 11/10/25 16:33:25.292 Object exists in ExistByName: example-argocd_test-ns-1 Object exists in ExistByName: example-argocd_test-ns-1 STEP: verifying Role/RoleBinding for example-argocd_dev-ns-1 in dev-ns-1 namespace @ 11/10/25 16:33:25.391 Object exists in ExistByName: example-argocd_dev-ns-1 Object exists in ExistByName: example-argocd_dev-ns-1 STEP: setting Argo CD instance sourceNamespaces to 'test-ns*' @ 11/10/25 16:33:45.48 STEP: verifying dev-ns-1 eventually becomes unmanaged @ 11/10/25 16:33:52.557 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: • [179.265 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-052_validate_rolebinding_number verifies RoleBindings are added to namespace-scoped Namespace when that Namespace is managed by openshift-gitops /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:38 Deleting Namespace dev Deleting Namespace dev-ns-1 Deleting Namespace other-ns Deleting Namespace test Deleting Namespace test-1 Deleting Namespace test-2 Deleting Namespace test-ns-1 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating simple namespace-scoped Argo CD instance @ 11/10/25 16:34:44.669 Object does not exists in ExistByName: openshift-gitops-argocd-application-controller rolebindings.rbac.authorization.k8s.io "openshift-gitops-argocd-application-controller" not found Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server • [63.031 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-102_validate_handle_terminating_namespaces ensures that if one managed-by namespace is stuck in terminating, it does not prevent other managed-by namespaces from being managed or deployed to /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:55 Deleting Namespace gitops-e2e-test-d5f19383-99ad Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating simple namespace-scoped Argo CD instance @ 11/10/25 16:35:46.735 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready @ 11/10/25 16:35:46.845 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a namespace 'jane' containing a ConfigMap with a unowned finalizer @ 11/10/25 16:36:22.294 STEP: deleting the jane NS in a background go routine, which puts the jane NS into a simulated stuck in terminating state @ 11/10/25 16:36:22.372 STEP: verifying jane ns moves into terminating state @ 11/10/25 16:36:22.372 Namespace - HavePhase: Expected: Terminating / Actual: Terminating STEP: creating John NS @ 11/10/25 16:36:22.419 STEP: Wait for managed-by rolebindings to be created in John NS @ 11/10/25 16:36:22.482 argocd-server RoleBinding not yet found STEP: creating a test Argo CD Application targeting john NS @ 11/10/25 16:36:25.516 STEP: verifying Argo CD is successfully able to deploy to the John Namespace @ 11/10/25 16:36:25.534 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced • [69.915 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-003_validate_cluster_config verifies that adding namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES will cause clusterrole and clusterrolebinding to be created for server, app controller, and application set /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:66 Deleting Namespace gitops-e2e-test-e42d0ad3-a2d3 Deleting Namespace jane Deleting Namespace john Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: creating simple namespace-scoped ArgoCD instance .spec.initialSSHKnownHosts set @ 11/10/25 16:37:06.742 STEP: adding argocd-e2e-cluster-config to ARGOCD_CLUSTER_CONFIG_NAMESPACES @ 11/10/25 16:37:06.79 STEP: verifying ClusterRole/Binding were created for argocd-e2e-cluster-config server/app controller components, now that the namespace is specified in the CLUSTER_CONFIG env var @ 11/10/25 16:37:06.92 Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-server Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-server ArgoCD status is now Available HaveServerStatus: expected: Running / actual: Running STEP: verifying that the initialSSHKnownHosts value was set in the ConfigMap @ 11/10/25 16:37:47.67 Object exists in ExistByName: argocd-ssh-known-hosts-cm HaveStringDataKeyValue: ConfigMag key ssh_known_hosts Have: github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ== Expected: github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ== STEP: adding source namespaces and additional SCM providers to applications to controller @ 11/10/25 16:37:47.76 STEP: verifying applicationset controller becomes available @ 11/10/25 16:37:54.832 ArgoCD status is now Available HaveApplicationSetControllerStatus: expected: Running / actual: Running STEP: verifying ClusterRole/RoleBinding were created for the argocd-e2e-cluster-config namespace @ 11/10/25 16:38:04.965 Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-applicationset-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-applicationset-controller • [89.298 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-110_validate_podsecurity_alerts verifies openshift-gitops Namespace has expected pod-security labels /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-110_validate_podsecurity_alerts_test.go:20 Deleting Namespace argocd-e2e-cluster-config Object exists in ExistByName: openshift-gitops ArgoCD status is now Available Object exists in ExistByName: openshift-gitops HaveLabelWithValue - Key pod-security.kubernetes.io/audit Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/audit-version Expect: latest / Have: latest HaveLabelWithValue - Key pod-security.kubernetes.io/enforce Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/enforce-version Expect: v1.29 / Have: v1.29 HaveLabelWithValue - Key pod-security.kubernetes.io/warn Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/warn-version Expect: latest / Have: latest • [31.001 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-037_validate_applicationset_in_any_namespace verifying that ArgoCD CR '.spec.applicationset.sourcenamespaces' and '.spec.sourcenamespaces' correctly control role/rolebindings within the managed namespaces /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:52 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: 0) create namespaces: appset-argocd, appset-old-ns, appset-new-ns @ 11/10/25 16:38:46.859 STEP: 1) create Argo CD instance with no source namespaces @ 11/10/25 16:38:47.062 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available HaveApplicationSetControllerStatus: expected: Running / actual: Running STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns @ 11/10/25 16:39:22.605 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' @ 11/10/25 16:40:02.821 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 2) modifying ArgoCD to have one sourceNamespace: appset-old-ns @ 11/10/25 16:40:12.879 ArgoCD status is now Available STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns @ 11/10/25 16:40:30.032 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' @ 11/10/25 16:41:10.248 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 3) modifying ArgoCD to have 2 sourceNamespaces: appset-old-ns, appset-new-ns @ 11/10/25 16:41:20.309 ArgoCD status is now Available STEP: verifying that expected Role/Rolebindings [example_appset-new-ns example-appset-argocd-applicationset] exist in appset-new-ns @ 11/10/25 16:41:37.475 STEP: verifying that namespaceappset-new-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' @ 11/10/25 16:42:17.708 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns @ 11/10/25 16:42:27.766 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' @ 11/10/25 16:43:07.994 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 4) Add a sourceNamespace of 'appset-new-ns' to ArgoCD CR @ 11/10/25 16:43:18.053 STEP: verifying that Role in appset-new-ns has expected RBAC permissions: ability to modify applications, batch, and applicationsets @ 11/10/25 16:43:25.133 Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] STEP: verifying RoleBinding for argocd-server and argocd-application-controller exists in appset-new-ns namespace @ 11/10/25 16:43:25.256 Object exists in ExistByName: example_appset-new-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset STEP: verifying appset-new-ns namespace is managed as both a source namespace and an application set source namespace @ 11/10/25 16:43:25.388 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns @ 11/10/25 16:43:25.479 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' @ 11/10/25 16:44:05.688 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 5) Adds 'appset-old-ns' to spec.sourceNamespace @ 11/10/25 16:44:15.746 STEP: verifying that appset-old-ns gains Role/RoleBindings similar to appset-new-ns @ 11/10/25 16:44:22.828 HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] Object exists in ExistByName: example_appset-old-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] Object exists in ExistByName: example_appset-new-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: 6) Remove 'appset-new-ns' from .spec.appliationSet.sourceNamespaces @ 11/10/25 16:44:43.319 STEP: verifying that applicationsets has been removed from Role @ 11/10/25 16:44:50.376 Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []}] STEP: verifying RoleBinding still has expected role and subjects @ 11/10/25 16:44:50.482 Object exists in ExistByName: example_appset-new-ns STEP: verifying appset-new-ns namespace should still be managed-by-cluster-argocd @ 11/10/25 16:44:50.589 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: verifying appset-new-ns applicationset role/binding no longer exists in the namespace @ 11/10/25 16:44:50.645 STEP: verifying appset-new-ns applicationset is not applicationset-managed-by Argo CD instance @ 11/10/25 16:45:10.755 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 7) Remove all .spec.sourceNamespaces @ 11/10/25 16:45:20.811 STEP: verifying role/rolebinding no longer exists in any namespace @ 11/10/25 16:45:27.893 STEP: verifying applicationset-managed-by and managed-by are not set on any namespace @ 11/10/25 16:46:28.239 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: • [502.313 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-105_validate_label_selector ensures that ARGOCD_LABEL_SELECTOR controls which ArgoCD CRs are reconciled via operator /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:36 Deleting Namespace appset-argocd Deleting Namespace appset-new-ns Deleting Namespace appset-old-ns Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: adding ARGOCD_LABEL_SELECTOR foo=bar to Operator @ 11/10/25 16:47:29.268 STEP: creating new namespace-scoped ArgoCD instance in test-argocd @ 11/10/25 16:47:29.392 Deleting Namespace test-argocd ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available STEP: adding foo=bar label to ArgoCD, which should now cause the ArgoCD to be reconciled @ 11/10/25 16:49:59.569 STEP: verifying that ArgoCD becomes available @ 11/10/25 16:50:06.662 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: adding custom rbac to .spec.rbac of ArgoCD @ 11/10/25 16:50:37.032 STEP: verifying ArgoCD becomes available after .spec update and that argocd-rbac-cm ConfigMap has expected values from ArgoCD CR rbac field @ 11/10/25 16:50:44.099 ArgoCD status is now Available Object exists in ExistByName: argocd-rbac-cm STEP: removing foo label from ArgoCD @ 11/10/25 16:50:54.212 STEP: updating RBAC policy field of ArgoCD @ 11/10/25 16:51:01.282 STEP: verifying that Argo CD argocd-rbac-cm ConfigMap has not changed, since ArgoCD does not have the required foo=bar label @ 11/10/25 16:51:08.377 Object exists in ExistByName: argocd-rbac-cm Waiting: {ARGOCD_LABEL_SELECTOR foo=bar nil} is still present in Deployment openshift-gitops-operator-controller-manager • [273.501 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-111_validate_default_argocd_route ensuring that default openshift-gitops instance has expected default Argo CD server route, and that it is possible to modify the values on that default instance /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:27 Deleting Namespace test-argocd Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying route of openshift-gitops Argo CD instance has expected values @ 11/10/25 16:52:02.858 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server STEP: verifying Route has admitted ingress @ 11/10/25 16:52:13.037 HaveAdmittedIngress - value: true STEP: verifying the argocd-server-tls secret is created by the OpenShift's service CA @ 11/10/25 16:52:13.082 Object exists in ExistByName: argocd-server-tls STEP: updating ArgoCD CR server route to TLS passthrough and TLS termination policy of none @ 11/10/25 16:52:13.126 STEP: verifying server Route has changed to the TLS new values from ArgoCD CR @ 11/10/25 16:52:20.199 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server • [65.325 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-005_validate_metrics_test verifies that default ServiceMonitors exist in openshift-gitops and PrometheusRule ArgoCDSyncAlert exists /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:22 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying openshift-gitops ServiceMonitor exists and has expected values @ 11/10/25 16:52:48.008 Object exists in ExistByName: openshift-gitops STEP: verifying openshift-gitops-repo-server ServiceMonitor exists and has expected values @ 11/10/25 16:52:48.062 Object exists in ExistByName: openshift-gitops-repo-server STEP: verifying openshift-gitops-server ServiceMonitor exists and has expected values @ 11/10/25 16:52:48.106 Object exists in ExistByName: openshift-gitops-server STEP: verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values @ 11/10/25 16:52:48.15 Object exists in ExistByName: gitops-operator-argocd-alerts • [10.808 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-002-validate_backend_service validates backend service permissions /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:22 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: checking the openshift-gitops namespace installed by default @ 11/10/25 16:52:58.803 Object exists in ExistByName: openshift-gitops STEP: checking we have a cluster deployment in the namespace @ 11/10/25 16:52:58.842 Object exists in ExistByName: cluster Deployment cluster - HaveReplicas: expected: 1 actual: 1 Deployment cluster - HaveReadyReplicas: expected: 1 actual: 1 STEP: checking Service for cluster exists @ 11/10/25 16:52:58.96 Object exists in ExistByName: cluster • [10.805 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-027_validate_operand_from_git verifies that a custom Argo CD instance can be deployed by the 'openshift-gitops' Argo CD instance. It also verfies that the custom Argo CD instance is able to deploy a simple application /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:57 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying openshift-gitops Argo CD instance is available @ 11/10/25 16:53:09.664 ArgoCD status is now Available STEP: creating Argo CD Application in openshift-gitops namespace @ 11/10/25 16:53:19.724 STEP: verifying test-1-27-custom NS is created and is managed by openshift-gitops, and Application deploys successfully @ 11/10/25 16:53:19.763 Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object exists in ExistByName: test-1-27-custom Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by Expected: openshift-gitops / Actual: openshift-gitops HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Argo CD instance deployed by Argo CD becomes available @ 11/10/25 16:53:24.982 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a new simple Argo CD Application which deploys a simple guestbook app. The Application is defined in 'test-1-27-custom namespace'. That namespace is also where the guestbook application resources are deployed. @ 11/10/25 16:54:00.361 STEP: verifying expected Argo CD workloads exist in test-1-27-custom namespace @ 11/10/25 16:54:00.376 Object exists in ExistByName: argocd-redis Deployment argocd-redis - HaveReplicas: expected: 1 actual: 1 Deployment argocd-redis - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-server Deployment argocd-server - HaveReplicas: expected: 1 actual: 1 Deployment argocd-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-repo-server Deployment argocd-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment argocd-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Object does not exists in ExistByName: nginx-deployment deployments.apps "nginx-deployment" not found Object does not exists in ExistByName: nginx-deployment deployments.apps "nginx-deployment" not found Object exists in ExistByName: nginx-deployment Deployment nginx-deployment - HaveReplicas: expected: 1 actual: 1 Deployment nginx-deployment - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-application-controller StatefulSet HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 STEP: verifying Argo CD instance in test-1-27-custom is available @ 11/10/25 16:54:07.085 ArgoCD status is now Available STEP: verifying both Argo CD Applications are able to sucessfully deploy @ 11/10/25 16:54:17.153 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced • [78.353 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-086_validate_default_argocd_role verifies that Argo CD roles are defined as expected in argocd-rbac-cm, based on values in ArgoCD .spec.rbac.defaultPolicy /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:36 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying default ArgoCD in openshift-gitops is running and has defined expected RBAC values in ConfigMap argocd-rbac-cm @ 11/10/25 16:54:27.883 ArgoCD status is now Available Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: openshift-gitops / Have: openshift-gitops HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd STEP: creating 3 ArgoCD instances in 3 different namespaces, with different RBAC policies @ 11/10/25 16:54:38.151 STEP: verifying Argo CD instances become available @ 11/10/25 16:54:38.411 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available ArgoCD status is now Available ArgoCD status is now Available STEP: verifying argocd-rbac-cm ConfigMap contains the expected values in each namespace @ 11/10/25 16:55:33.911 Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy / Have: argocd-default-policy HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy-empty / Have: argocd-default-policy-empty HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy-admin / Have: argocd-default-policy-admin HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd • [77.034 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-107_validate_redis_scc verifies that when Argo CD has HA enabled that the redis pods use restricted-v2 security policy /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:35 Deleting Namespace test-1-086-custom Deleting Namespace test-1-086-custom2 Deleting Namespace test-1-086-custom3 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying we are running on a cluster with at least 3 nodes. This is required for Redis HA @ 11/10/25 16:56:45.029 ExpectHasAtLeastXNodes, expected: 3 actual: 6 STEP: creating simple namespace-scoped Argo CD instance with HA enabled @ 11/10/25 16:56:45.081 STEP: verifying HA Redis becomes available @ 11/10/25 16:56:45.198 HaveRedisStatus: expected: Running / actual: HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Running STEP: verifying that argocd-redis-ha pod has scc of restricted-v2 @ 11/10/25 16:58:41.717 STEP: verifying that argocd-redis-ha-haproxy pod has scc of restricted-v2 @ 11/10/25 16:58:41.73 • [187.386 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-106_validate_argocd_metrics_controller verifies Argo CD metrics can be disabled and re-enabled /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:50 Deleting Namespace gitops-e2e-test-d6313806-7d24 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: verifying Argo CD metrics are enabled by default in openshift-gitops @ 11/10/25 16:59:47.351 ArgoCD status is now Available HaveLabelWithValue - Key openshift.io/cluster-monitoring Expect: true / Have: true Object exists in ExistByName: openshift-gitops Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-read Object exists in ExistByName: openshift-gitops-prometheus-k8s-read-binding Object exists in ExistByName: gitops-operator-argocd-alerts STEP: disabling metrics via ArgoCD CR .spec.monitoring.disableMetrics @ 11/10/25 16:59:57.725 STEP: verifying all metrics resources are in disabled state @ 11/10/25 17:00:04.789 STEP: re-enabling metrics @ 11/10/25 17:00:15.091 STEP: verifying metrics are re-enabled @ 11/10/25 17:00:22.155 HaveLabelWithValue - Key openshift.io/cluster-monitoring Expect: true / Have: true Object exists in ExistByName: openshift-gitops Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-read Object exists in ExistByName: openshift-gitops-prometheus-k8s-read-binding Object exists in ExistByName: gitops-operator-argocd-alerts • [100.667 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should create Roles/RoleBindings when namespaceManagement is enabled from ArgoCD NamespaceManagement field /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:183 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: Create ArgoCD with namespaceManagement field set to true @ 11/10/25 17:00:33.13 STEP: waiting for Argo CD to be available @ 11/10/25 17:00:33.189 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespaceManagement via env var @ 11/10/25 17:01:08.569 STEP: Create namespaceManagement CR with the namespace which needs to be managed @ 11/10/25 17:01:08.673 STEP: Verify Roles/RoleBindings are created for managed namespace @ 11/10/25 17:01:08.688 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Verify Application and Secret of managed namespace @ 11/10/25 17:01:39.18 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces @ 11/10/25 17:01:39.18 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom STEP: creating Argo CD Application targeting the other namespace @ 11/10/25 17:01:49.258 STEP: verifying that Argo CD is able to deploy to that other namespace @ 11/10/25 17:01:49.284 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager • [111.768 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should not create Roles/RoleBindings when namespaceManagement env var is not set /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:211 Deleting Namespace gitops-e2e-test-104e74cb-aed3 Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: Create ArgoCD with namespaceManagement field set to true @ 11/10/25 17:02:45.096 STEP: waiting for Argo CD to be available @ 11/10/25 17:02:45.145 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Create namespaceManagement CR with the namespace which needs to be managed @ 11/10/25 17:03:20.591 STEP: Verify Roles/RoleBindings are created for managed namespace @ 11/10/25 17:03:20.608 STEP: Verify Application and Secret of managed namespace @ 11/10/25 17:03:50.769 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces @ 11/10/25 17:03:50.769 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a STEP: creating Argo CD Application targeting the other namespace @ 11/10/25 17:04:00.874 STEP: verifying that Argo CD is NOT able to deploy to that other namespace @ 11/10/25 17:04:00.905 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced • [167.059 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement Should not create Roles/RoleBindings when namespaceManagement is disabled via the ArgoCD NamespaceManagement.AllowManagedBy field. /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:236 Deleting Namespace gitops-e2e-test-5571e6a3-544a Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: Create ArgoCD with namespaceManagement field set to false @ 11/10/25 17:05:32.174 STEP: waiting for Argo CD to be available @ 11/10/25 17:05:32.222 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespace management via env var @ 11/10/25 17:06:07.657 STEP: Create namespaceManagement CR @ 11/10/25 17:06:07.784 STEP: Verify Roles/RoleBindings are not created for managed namespace @ 11/10/25 17:06:07.804 STEP: Verify Application and Secret of managed namespace @ 11/10/25 17:06:37.962 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces @ 11/10/25 17:06:37.962 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a STEP: creating Argo CD Application targeting the other namespace @ 11/10/25 17:06:48.063 STEP: verifying that Argo CD is NOT able to deploy to that other namespace @ 11/10/25 17:06:48.095 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager • [181.615 seconds] ------------------------------ GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should support glob pattern(test-*) matching for managed namespaces /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 Deleting Namespace gitops-e2e-test-d7db4707-a82a Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available STEP: Create ArgoCD with namespaceManagement field set to true @ 11/10/25 17:08:33.894 STEP: waiting for Argo CD to be available @ 11/10/25 17:08:33.951 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespace management via env var @ 11/10/25 17:09:09.382 STEP: Create namespaceManagement CR @ 11/10/25 17:09:09.518 STEP: Verify Roles/RoleBindings are created for managed namespace test-113-custom @ 11/10/25 17:09:09.535 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Create namespaceManagement CR 2 @ 11/10/25 17:09:40.1 STEP: Verify Roles/RoleBindings are created for managed namespace test-second-nms @ 11/10/25 17:09:40.117 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Verify Application and Secret of managed namespace test-113-custom @ 11/10/25 17:09:45.337 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces @ 11/10/25 17:09:45.337 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms STEP: creating Argo CD Application targeting the other namespace @ 11/10/25 17:09:55.445 STEP: verifying that Argo CD is able to deploy to that other namespace @ 11/10/25 17:09:55.477 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Application and Secret of managed namespace test-second-nms @ 11/10/25 17:10:05.727 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces @ 11/10/25 17:10:05.727 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms STEP: creating Argo CD Application targeting the other namespace @ 11/10/25 17:10:15.815 STEP: verifying that Argo CD is able to deploy to that other namespace @ 11/10/25 17:10:15.83 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Create a namespace that does NOT match glob pattern @ 11/10/25 17:10:15.933 STEP: Create namespaceManagement CR in unmanaged namespace (no match expected) @ 11/10/25 17:10:15.992 STEP: Verify Roles/RoleBindings are NOT created for unmanaged namespace @ 11/10/25 17:10:16.01 Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager [TIMEDOUT] in [AfterEach] - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.676 • [TIMEDOUT] [163.792 seconds] GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement [AfterEach] should support glob pattern(test-*) matching for managed namespaces [AfterEach] /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 [It] /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 [TIMEDOUT] A suite timeout occurred In [AfterEach] at: /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.676 Full Stack Trace This is the Progress Report generated when the suite timeout occurred: GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should support glob pattern(test-*) matching for managed namespaces (Spec Runtime: 2m43.792s) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 In [AfterEach] (Node Runtime: 451ms) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 Spec Goroutine goroutine 7104 [select] github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000438850, {0x438fec8, 0xc001ca83e0}, 0x1, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:546 github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000438850, {0x438fec8, 0xc001ca83e0}, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:145 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.waitForAllEnvVarsToBeRemovedFromDeployments({0x3d7ddf4, 0x19}, {0xc003c92d20, 0x5, 0x5}, {0x43b47e0, 0xc00431acf0}) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:603 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.RestoreSubcriptionToDefault() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:553 > github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential.init.func43.1.2() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:61 | defer fixture.RestoreSubcriptionToDefault() // revert Subscription at end of test | fixture.OutputDebugOnFail(randomNS.Name, nsCustom.Name) > }) | | deployArgoCD := func(namespace string, managedNamespaces []argov1beta1api.ManagedNamespaces) *argov1beta1api.ArgoCD { github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x1c67066?, 0xc002010180?}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/node.go:475 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:894 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 32 /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:881 ------------------------------ SSSSSSSSSSSSSSSS ------------------------------ [AfterSuite]  /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:47 [AfterSuite] PASSED [0.000 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Summarizing 1 Failure: [TIMEDOUT] GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement [AfterEach] should support glob pattern(test-*) matching for managed namespaces /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 Ran 34 of 50 Specs in 3558.140 seconds FAIL! - Suite Timeout Elapsed -- 33 Passed | 1 Failed | 0 Pending | 16 Skipped --- FAIL: TestSequentialSuite (3558.14s) FAIL Ginkgo ran 1 suite in 1h0m0.082221495s Test Suite Failed + exit_code=1 + cat openshift-gitops-sequential-e2e.xml > Enter [BeforeSuite] TOP-LEVEL - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:42 @ 11/10/25 16:11:28.537 < Exit [BeforeSuite] TOP-LEVEL - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:42 @ 11/10/25 16:11:28.537 (0s) > Enter [BeforeEach] 1-064_validate_tcp_reset_error_test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:49 @ 11/10/25 16:11:28.538 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-064_validate_tcp_reset_error_test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:49 @ 11/10/25 16:11:40.336 (11.799s) > Enter [It] verifies that argocd cli app manifests command will succesfully retrieve app manifests, and tcp reset error will not occur - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:55 @ 11/10/25 16:11:40.336 STEP: verifying openshift-gitops Argo CD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:62 @ 11/10/25 16:11:40.382 ArgoCD status is now Available STEP: creating Argo CD Application in openshift-gitops namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:65 @ 11/10/25 16:11:50.458 STEP: verifying test-1-27-custom NS is created and is managed by openshift-gitops, and Application deploys successfully - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:93 @ 11/10/25 16:11:50.531 Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object exists in ExistByName: test-1-27-custom Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by Expected: openshift-gitops / Actual: openshift-gitops HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Argo CD instance deployed by Argo CD becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:107 @ 11/10/25 16:12:00.875 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a new simple Argo CD Application which deploys a simple guestbook app. The Application is defined in 'test-1-27-custom namespace'. That namespace is also where the guestbook application resources are deployed. - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:116 @ 11/10/25 16:12:36.316 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Progressing / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: verifying we can log in to Argo CD via CLI - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:143 @ 11/10/25 16:12:46.572 executing command [argocd login openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com --username admin --password JsITE2xqO6PvYMGXHjLFzQy1krAUw7D0 --insecure --skip-test-tls] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:12:46Z"} 'admin:login' logged in successfully Context 'openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com' updated STEP: retrieving the Argo CD app manifests via CLI, and verifying the command succeeds and that there is no 'TCP reset error' error - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:146 @ 11/10/25 16:12:47.651 executing command: [argocd app manifests 1-27-argocd --source git --revision HEAD] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:12:47Z"} --- apiVersion: v1 kind: Namespace metadata: labels: app.kubernetes.io/instance: 1-27-argocd argocd.argoproj.io/managed-by: openshift-gitops name: test-1-27-custom --- apiVersion: argoproj.io/v1alpha1 kind: ArgoCD metadata: labels: app.kubernetes.io/instance: 1-27-argocd name: argocd namespace: test-1-27-custom < Exit [It] verifies that argocd cli app manifests command will succesfully retrieve app manifests, and tcp reset error will not occur - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-064_validate_tcp_reset_error_test.go:55 @ 11/10/25 16:12:48.083 (1m7.747s) > Enter [BeforeEach] 1-109_validate_reencrypt_termination_policy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:18 @ 11/10/25 16:12:48.083 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-109_validate_reencrypt_termination_policy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:18 @ 11/10/25 16:12:58.775 (10.691s) > Enter [It] ensure the openshift-gitops default argo cd server route has expected TLS Config values: insecure redirect and reencrypt, and the route ingress is sucessfully admitted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:22 @ 11/10/25 16:12:58.775 STEP: ensuring that default openshift-gitops has expecter route settings and an admitted ingress - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:24 @ 11/10/25 16:12:58.775 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server HaveAdmittedIngress - value: true < Exit [It] ensure the openshift-gitops default argo cd server route has expected TLS Config values: insecure redirect and reencrypt, and the route ingress is sucessfully admitted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-109_validate_reencrypt_termination_policy_test.go:22 @ 11/10/25 16:13:08.996 (10.221s) > Enter [BeforeEach] 1-050_validate_sso - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:32 @ 11/10/25 16:13:08.996 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-050_validate_sso - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:32 @ 11/10/25 16:13:19.615 (10.619s) > Enter [It] ensures Dex/Keycloak SSO can be enabled and disabled on a namespace-scoped Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:48 @ 11/10/25 16:13:19.615 STEP: creating a new Argo CD instance with dex and openshift oauth enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:52 @ 11/10/25 16:13:19.677 STEP: verifying Argo CD is available and Dex is running - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:70 @ 11/10/25 16:13:19.727 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available HaveSSOStatus: expected: Running / actual: Running Object exists in ExistByName: argocd-dex-server Deployment argocd-dex-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-argocd-dex-server Object exists in ExistByName: argocd-dex-server STEP: disabling SSO - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:91 @ 11/10/25 16:13:55.457 STEP: verifying that Argo CD becomes available after disabling SSO, and SSO is disabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:97 @ 11/10/25 16:14:02.531 ArgoCD status is now Available HaveSSOStatus: expected: Unknown / actual: Unknown STEP: verifying dex resources no longer exist - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:101 @ 11/10/25 16:14:12.652 < Exit [It] ensures Dex/Keycloak SSO can be enabled and disabled on a namespace-scoped Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:48 @ 11/10/25 16:15:02.921 (1m43.306s) > Enter [AfterEach] 1-050_validate_sso - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:39 @ 11/10/25 16:15:02.921 < Exit [AfterEach] 1-050_validate_sso - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-050_validate_sso_test.go:39 @ 11/10/25 16:15:02.978 (57ms) > Enter [BeforeEach] 1-035-validate_argocd_secret_repopulate - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:29 @ 11/10/25 16:15:02.978 Deleting Namespace gitops-e2e-test-c46ace83-5925 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-035-validate_argocd_secret_repopulate - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:29 @ 11/10/25 16:15:33.602 (30.624s) > Enter [It] verifies 'argocd-secret' secret is regenerated and we are able to login using that Secret - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:36 @ 11/10/25 16:15:33.602 STEP: checking OpenShift GitOps ArgoCD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:38 @ 11/10/25 16:15:33.602 ArgoCD status is now Available STEP: removing data from argocd-secret, to check that it is regenerated - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:43 @ 11/10/25 16:15:43.717 STEP: verifying that Secret repopulates - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:49 @ 11/10/25 16:15:43.785 ArgoCD status is now Available STEP: verifying operator Deployment is ready - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:69 @ 11/10/25 16:15:56.904 Deployment openshift-gitops-operator-controller-manager - HaveReadyReplicas: expected: 1 actual: 1 executing command [argocd login openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com --username admin --password JsITE2xqO6PvYMGXHjLFzQy1krAUw7D0 --insecure --skip-test-tls] {"level":"warning","msg":"Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web.","time":"2025-11-10T16:15:57Z"} 'admin:login' logged in successfully Context 'openshift-gitops-server-openshift-gitops.apps.ci-op-2r4hj9zs-6e0ce.cspilp.interop.ccitredhat.com' updated < Exit [It] verifies 'argocd-secret' secret is regenerated and we are able to login using that Secret - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-035_validate_argocd_secret_repopulate_test.go:36 @ 11/10/25 16:15:57.76 (24.158s) > Enter [BeforeEach] 1-006_validate_machine_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:50 @ 11/10/25 16:15:57.76 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-006_validate_machine_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:50 @ 11/10/25 16:16:08.326 (10.565s) > Enter [It] verifies that repo server replicas can be modified via .spec.repo.replicas - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:56 @ 11/10/25 16:16:08.326 STEP: setting the repo server replicas to 2 on openshift-gitops Argo CD - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:58 @ 11/10/25 16:16:08.326 STEP: creating an Argo CD Application targeting the Argo CD namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:74 @ 11/10/25 16:16:15.441 STEP: waiting for Argo CD to become available after the repo server change we made - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:101 @ 11/10/25 16:16:15.502 ArgoCD status is now Available STEP: verifying deployment and statefulset have expected number of replicas, including the repo server which should have 2 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:104 @ 11/10/25 16:16:25.57 Object exists in ExistByName: openshift-gitops-server Deployment openshift-gitops-server - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-redis Deployment openshift-gitops-redis - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-redis - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-applicationset-controller Deployment openshift-gitops-applicationset-controller - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-applicationset-controller - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: openshift-gitops-repo-server Deployment openshift-gitops-repo-server - HaveReplicas: expected: 2 actual: 2 Deployment openshift-gitops-repo-server - HaveReadyReplicas: expected: 2 actual: 2 Object exists in ExistByName: openshift-gitops-application-controller StatefulSet HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 STEP: verifying the Application has deployed successfully - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:140 @ 11/10/25 16:16:26.163 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: updating repo server replicas back to 1 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:144 @ 11/10/25 16:16:26.243 STEP: verifying repo server Deployment moves back to a single replica - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:149 @ 11/10/25 16:16:33.308 Object exists in ExistByName: openshift-gitops-repo-server Deployment openshift-gitops-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment openshift-gitops-repo-server - HaveReadyReplicas: expected: 1 actual: 1 < Exit [It] verifies that repo server replicas can be modified via .spec.repo.replicas - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-006_validate_machine_config_test.go:56 @ 11/10/25 16:16:40.53 (32.204s) > Enter [BeforeEach] 1-108_alternate_cluster_roles_cluster_scoped_instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:55 @ 11/10/25 16:16:40.53 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-108_alternate_cluster_roles_cluster_scoped_instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:55 @ 11/10/25 16:16:51.065 (10.534s) > Enter [It] verifies that you can add alternate namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES, and that the clusterrole and binding created by this feature can be disabled via DefaultClusterScopedRoleDisabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:75 @ 11/10/25 16:16:51.065 STEP: creating new namespace alternate-role - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:82 @ 11/10/25 16:16:51.065 STEP: adding alternate-role to ARGOCD_CLUSTER_CONFIG_NAMESPACES in Subscription - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:85 @ 11/10/25 16:16:51.121 STEP: creating an ArgoCD instance in the new namespace, and waiting for it to be available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:89 @ 11/10/25 16:16:51.23 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying clusterrole is created for the new namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:98 @ 11/10/25 16:17:26.655 Object exists in ExistByName: argocd-alternate-role-argocd-application-controller STEP: verifying the new app controller clusterrole has the expected permissions - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:106 @ 11/10/25 16:17:26.705 STEP: verifying the new server clusterrole has the expected permissions - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:179 @ 11/10/25 16:17:26.705 Object exists in ExistByName: argocd-alternate-role-argocd-server STEP: verifying the expected ClusterRoleBindings exist, for the new namespce - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:210 @ 11/10/25 16:17:26.742 Object exists in ExistByName: argocd-alternate-role-argocd-application-controller Object exists in ExistByName: argocd-alternate-role-argocd-server STEP: creating a test Argo CD Application that will deploy to the new namespace, from the new namepsace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:225 @ 11/10/25 16:17:26.821 STEP: verifying Argo CD is successfully able to reconcile and deploy the resources of the test Argo CD Application - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:258 @ 11/10/25 16:17:26.837 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: verifying that the resources defined in the Application CR are deployed and have the expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:263 @ 11/10/25 16:17:31.982 Object exists in ExistByName: test-gitops-ns Object exists in ExistByName: test-gitops-pv PersistentVolume HavePhase: expected: Available actual: Available STEP: disabling defaultClusterScopedRole for ArgoCD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:293 @ 11/10/25 16:17:32.101 STEP: verifying that cluster-scopes roles/rolebindings are deleted after we disabled defaultClusterScopedRole - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:298 @ 11/10/25 16:17:39.162 STEP: creating a new clusterrole and rolebinding to replace the one we deleted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:311 @ 11/10/25 16:18:19.398 STEP: deleting the resources that were previously created by Argo CD Application deply - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:350 @ 11/10/25 16:18:19.427 STEP: verifying that Argo CD says it is not able to deploy the PV due to missing permissions - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:354 @ 11/10/25 16:18:19.462 .app.status.operationStatus.message is successfully synced (all tasks run) .app.status.operationStatus.message is one or more objects failed to apply, reason: persistentvolumes is forbidden: User "system:serviceaccount:alternate-role:argocd-argocd-application-controller" cannot create resource "persistentvolumes" in API group "" at the cluster scope due to application controller sync timeout. Retrying attempt #1 at 4:18PM. STEP: adding permissions back to the clusterrole - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:372 @ 11/10/25 16:18:22.493 STEP: verifying that Argo CD is again able to deploy the resources defined in the Argo CD Application - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:388 @ 11/10/25 16:18:22.565 Object exists in ExistByName: test-gitops-ns Object does not exists in ExistByName: test-gitops-pv persistentvolumes "test-gitops-pv" not found Object does not exists in ExistByName: test-gitops-pv persistentvolumes "test-gitops-pv" not found Object exists in ExistByName: test-gitops-pv PersistentVolume HavePhase: expected: Available actual: Available < Exit [It] verifies that you can add alternate namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES, and that the clusterrole and binding created by this feature can be disabled via DefaultClusterScopedRoleDisabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:75 @ 11/10/25 16:18:32.812 (1m41.747s) > Enter [AfterEach] 1-108_alternate_cluster_roles_cluster_scoped_instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:62 @ 11/10/25 16:18:32.812 < Exit [AfterEach] 1-108_alternate_cluster_roles_cluster_scoped_instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-108_alternate_cluster_roles_cluster_scoped_instance_test.go:62 @ 11/10/25 16:18:32.869 (56ms) > Enter [BeforeEach] 1-074_validate_terminating_namespace_block - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:46 @ 11/10/25 16:18:32.869 Deleting Namespace alternate-role Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-074_validate_terminating_namespace_block - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:46 @ 11/10/25 16:18:58.456 (25.587s) > Enter [It] ensures that if one managed namespace is stuck in deleting state -- due to a finalizer -- it does not block other managed namespaces from being reconciled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:52 @ 11/10/25 16:18:58.456 STEP: creating an Argo CD instance that will manage other namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:54 @ 11/10/25 16:18:58.456 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:73 @ 11/10/25 16:18:58.558 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a ConfigMap with a finalizer, so that when the Namespace is deleted, the Namespace cannot finish deleting until the ConfigMap finalizer is removed - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:97 @ 11/10/25 16:19:39.075 STEP: starting to delete the Namespace in the background. This puts the Namespace into deletion state, but it cannot finish deletion until the ConfigMap has its finalizer removed, which happens at the end of the test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:118 @ 11/10/25 16:19:39.098 STEP: creating a second managed namespace, to managed by the Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:124 @ 11/10/25 16:19:39.098 STEP: verifying that the operator is successfully able to grant access from the Argo CD instance to the second Namespace. That confirms that, even though the first namespace is in deletion state, that the operator is not blocked on other Namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:128 @ 11/10/25 16:19:39.151 Object does not exists in ExistByName: gitops-2242-argocd-argocd-server rolebindings.rbac.authorization.k8s.io "gitops-2242-argocd-argocd-server" not found Object exists in ExistByName: gitops-2242-argocd-argocd-server Object exists in ExistByName: gitops-2242-argocd-argocd-application-controller < Exit [It] ensures that if one managed namespace is stuck in deleting state -- due to a finalizer -- it does not block other managed namespaces from being reconciled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-074_validate_terminating_namespace_block_test.go:52 @ 11/10/25 16:19:42.465 (44.009s) > Enter [BeforeEach] 1-078_validate_default_argocd_consoleLink - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:17 @ 11/10/25 16:19:42.465 Deleting Namespace gitops-2242-ns-first Deleting Namespace gitops-2242-ns-main Deleting Namespace gitops-2242-ns-second Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-078_validate_default_argocd_consoleLink - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:17 @ 11/10/25 16:20:13.096 (30.632s) > Enter [It] verifies that DISABLE_DEFAULT_ARGOCD_CONSOLELINK disables the ConsoleLink, and it tolerates improper values and can be re-enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:21 @ 11/10/25 16:20:13.096 STEP: verifying default openshift-gitops Argo CD and ConsoleLink exist - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:28 @ 11/10/25 16:20:13.096 ArgoCD status is now Available Object exists in ExistByName: argocd STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to true in operator - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:37 @ 11/10/25 16:20:23.262 STEP: verifying ConsoleLink is deleted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:40 @ 11/10/25 16:20:23.37 STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK has the value 'true' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:45 @ 11/10/25 16:21:03.794 STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to false - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:58 @ 11/10/25 16:21:03.891 STEP: verifying ConsoleLink exists - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:61 @ 11/10/25 16:21:04 Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object does not exists in ExistByName: argocd consolelinks.console.openshift.io "argocd" not found Object exists in ExistByName: argocd STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK is 'false' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:65 @ 11/10/25 16:21:39.47 STEP: setting DISABLE_DEFAULT_ARGOCD_CONSOLELINK to an empty value - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:79 @ 11/10/25 16:21:39.549 STEP: verifying ConsoleLink continues to exist - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:83 @ 11/10/25 16:21:39.66 Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd STEP: verifying DISABLE_DEFAULT_ARGOCD_CONSOLELINK has an empty value - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:88 @ 11/10/25 16:21:49.7 STEP: cleaning up operator and ensuring ConsoleLink exists - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:102 @ 11/10/25 16:21:49.787 Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Waiting: {DISABLE_DEFAULT_ARGOCD_CONSOLELINK nil} is still present in Deployment openshift-gitops-operator-controller-manager Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd Object exists in ExistByName: argocd < Exit [It] verifies that DISABLE_DEFAULT_ARGOCD_CONSOLELINK disables the ConsoleLink, and it tolerates improper values and can be re-enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-078_validate_default_argocd_consoleLink_test.go:21 @ 11/10/25 16:22:17.367 (2m4.271s) > Enter [BeforeEach] 1-101_validate_rollout_policyrules - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:26 @ 11/10/25 16:22:17.367 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-101_validate_rollout_policyrules - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:26 @ 11/10/25 16:22:27.91 (10.542s) > Enter [It] verifying Rollouts operator creates the expected policy rules - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:33 @ 11/10/25 16:22:27.91 STEP: creating cluster-scoped Argo Rollouts instance in openshift-gitops RolloutManager - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:35 @ 11/10/25 16:22:27.91 STEP: verifying Rollouts ClusterRole contains expected policy rules - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:44 @ 11/10/25 16:22:27.948 Object exists in ExistByName: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/component Expect: argo-rollouts / Have: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/name Expect: argo-rollouts / Have: argo-rollouts HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argo-rollouts / Have: argo-rollouts < Exit [It] verifying Rollouts operator creates the expected policy rules - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-101_validate_rollout_policyrules_test.go:33 @ 11/10/25 16:22:28.12 (210ms) > Enter [BeforeEach] 1-085_validate_dynamic_plugin_installation - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:31 @ 11/10/25 16:22:28.12 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-085_validate_dynamic_plugin_installation - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:31 @ 11/10/25 16:22:38.76 (10.64s) > Enter [It] enables Dynamic plugin via modifying CSV, then verifies the gitops plugin resources are installed as expected - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:37 @ 11/10/25 16:22:38.76 executing command: [oc version] Client Version: v4.2.0-alpha.0-2015-g44b3ac2 Kustomize Version: v5.0.1 Server Version: 4.21.0-0.nightly-2025-11-05-234508 Kubernetes Version: v1.34.1 STEP: adding DYNAMIC_PLUGIN_START_OCP_VERSION to CSV operator Deployment env var list - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:87 @ 11/10/25 16:22:38.947 STEP: verifying the plugin's Deployment, ConfigMap, Secret, Service, and other resources have expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:98 @ 11/10/25 16:22:39.044 Object exists in ExistByName: gitops-plugin Deployment gitops-plugin - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: httpd-cfg HaveLabelWithValue - Key app Expect: gitops-plugin / Have: gitops-plugin HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: gitops-plugin / Have: gitops-plugin Object exists in ExistByName: console-serving-cert Object exists in ExistByName: gitops-plugin < Exit [It] enables Dynamic plugin via modifying CSV, then verifies the gitops plugin resources are installed as expected - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-085_validate_dynamic_plugin_installation_test.go:37 @ 11/10/25 16:22:39.405 (645ms) > Enter [BeforeEach] 1-010_validate-ootb-manage-other-namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:48 @ 11/10/25 16:22:39.405 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-010_validate-ootb-manage-other-namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:48 @ 11/10/25 16:22:49.934 (10.529s) > Enter [It] verifies that openshift-gitops Argo CD instance is able to manage/unmanage other namespaces via managed-by label - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:54 @ 11/10/25 16:22:49.934 STEP: creating a new namespace that is managed by openshift-gitops Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:56 @ 11/10/25 16:22:49.934 STEP: verifying openshift-gitops Argo CD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:63 @ 11/10/25 16:22:50.032 ArgoCD status is now Available STEP: verifying that new roles/rolebindings have be created in the new namespace, that allow the Argo CD instance to manage it - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:66 @ 11/10/25 16:23:00.102 Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server STEP: creating a new Argo CD application in openshift-gitops ns, targeting the new namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:93 @ 11/10/25 16:23:00.23 STEP: verifying that Argo CD is able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:120 @ 11/10/25 16:23:00.272 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Progressing / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: removing managed-by label from the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:124 @ 11/10/25 16:23:10.499 STEP: verifying Argo CD managed-by roles and rolebindings are removed from other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:129 @ 11/10/25 16:23:10.555 < Exit [It] verifies that openshift-gitops Argo CD instance is able to manage/unmanage other namespaces via managed-by label - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-010_validate-ootb-manage-other-namespace_test.go:54 @ 11/10/25 16:23:40.806 (50.872s) > Enter [BeforeEach] 1-041_validate_argocd_sync_alert - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:19 @ 11/10/25 16:23:40.806 Deleting Namespace test-1-10-custom Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-041_validate_argocd_sync_alert - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:19 @ 11/10/25 16:24:06.413 (25.607s) > Enter [It] verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:23 @ 11/10/25 16:24:06.413 STEP: checking OpenShift GitOps ArgoCD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:25 @ 11/10/25 16:24:06.413 ArgoCD status is now Available STEP: verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:31 @ 11/10/25 16:24:16.523 Object exists in ExistByName: gitops-operator-argocd-alerts < Exit [It] verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-041_validate_argocd_sync_alert_test.go:23 @ 11/10/25 16:24:16.561 (10.148s) > Enter [BeforeEach] 1-056_validate_managed-by - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:29 @ 11/10/25 16:24:16.561 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-056_validate_managed-by - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:29 @ 11/10/25 16:24:27.087 (10.526s) > Enter [It] verifies that managed-by works as expected and that REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION will remove managed-by label when the related ArgoCD instance is deleted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:40 @ 11/10/25 16:24:27.087 STEP: creating two namespaces in managed-by relationship - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:42 @ 11/10/25 16:24:27.087 STEP: creating simple Argo CD instance in test-1-56-target NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:47 @ 11/10/25 16:24:27.195 STEP: verifying Argo CD instance is started and expected resources exist - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:60 @ 11/10/25 16:24:27.238 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available Deployment example-argocd-redis - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-redis - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-server - HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 StatefulSet HaveReplicas: expected: 1 actual: 1 STEP: deleting Argo CD instance in test-1-56-target - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:87 @ 11/10/25 16:25:02.921 STEP: verifying test-1-56-custom is managed by test-1-56-target - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:90 @ 11/10/25 16:25:02.938 HaveLabelWithValue - Key argocd.argoproj.io/managed-by Expect: test-1-56-target / Have: test-1-56-target STEP: adding REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION=true to operator Subscription or Deployment - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:96 @ 11/10/25 16:25:02.992 STEP: creating new 2 new namespaces in managed-by relationship and an Argo CD instance to manage them - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:100 @ 11/10/25 16:25:03.143 STEP: verifying new Argo CD is available along with the expected resources, in the new Namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:117 @ 11/10/25 16:25:03.37 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available Deployment example-argocd-2-redis - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-redis - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-2-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment example-argocd-2-server - HaveReadyReplicas: expected: 1 actual: 1 Deployment example-argocd-2-server - HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 StatefulSet HaveReplicas: expected: 1 actual: 1 STEP: deleting the Argo CD in new namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:144 @ 11/10/25 16:25:39.059 STEP: verifying Namespace test-1-56-custom-2 does not have managed-by label for deleted Argo CD namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:147 @ 11/10/25 16:25:39.076 STEP: removing REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION from operator Subscription or Deplyoment - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:150 @ 11/10/25 16:25:39.118 STEP: removing Namespaces created during the test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:153 @ 11/10/25 16:25:39.281 < Exit [It] verifies that managed-by works as expected and that REMOVE_MANAGED_BY_LABEL_ON_ARGOCD_DELETION will remove managed-by label when the related ArgoCD instance is deleted - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:40 @ 11/10/25 16:25:39.416 (1m12.329s) > Enter [AfterEach] 1-056_validate_managed-by - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:36 @ 11/10/25 16:25:39.416 < Exit [AfterEach] 1-056_validate_managed-by - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-056_validate_managed-by_test.go:36 @ 11/10/25 16:25:39.416 (0s) > Enter [BeforeEach] 1-071_validate_SCC_HA - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:47 @ 11/10/25 16:25:39.416 Deleting Namespace test-1-56-custom Deleting Namespace test-1-56-custom-2 Deleting Namespace test-1-56-target Deleting Namespace test-1-56-target-2 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-071_validate_SCC_HA - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:47 @ 11/10/25 16:26:00.247 (20.831s) > Enter [It] creates SCC and ensure HA Argo CD starts as expected - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:53 @ 11/10/25 16:26:00.247 STEP: verifying we are running on a cluster with at least 3 nodes. This is required for Redis HA - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:55 @ 11/10/25 16:26:00.247 ExpectHasAtLeastXNodes, expected: 3 actual: 6 STEP: creating simple namespace-scoped Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:128 @ 11/10/25 16:26:00.39 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:141 @ 11/10/25 16:26:00.409 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying workload pods exist and are running - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:146 @ 11/10/25 16:26:45.917 STEP: enabling HA on Argo CD - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:167 @ 11/10/25 16:26:45.931 STEP: waiting for HA to be enabled on Argo CD, and Argo CD to be ready - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:172 @ 11/10/25 16:26:52.989 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: verifying workload pods exist and are running - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:146 @ 11/10/25 16:28:53.76 STEP: verifying workload HA pods exist and are running - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:178 @ 11/10/25 16:28:53.773 Object exists in ExistByName: argocd-redis-ha-server-1 Pod HavePhase: expected: Running actual: Running Object exists in ExistByName: argocd-redis-ha-server-2 Pod HavePhase: expected: Running actual: Running < Exit [It] creates SCC and ensure HA Argo CD starts as expected - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_SCC_HA_test.go:53 @ 11/10/25 16:28:53.99 (2m53.743s) > Enter [BeforeEach] 1-004_validate_argocd_installation - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:32 @ 11/10/25 16:28:53.99 Deleting Namespace gitops-e2e-test-4d7d1434-6b2c Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-004_validate_argocd_installation - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:32 @ 11/10/25 16:29:59.554 (1m5.564s) > Enter [It] verifies that default openshift-gitops Argo CD instance becomes available after modifying .spec.controller.processors.operation value - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:36 @ 11/10/25 16:29:59.554 STEP: verifying default openshift-gitops Argo CD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:38 @ 11/10/25 16:29:59.554 ArgoCD status is now Available STEP: modifying Argo CD instance app controller operation processors to 20 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:45 @ 11/10/25 16:30:09.676 STEP: verifying app controller instance becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:56 @ 11/10/25 16:30:16.742 ArgoCD status is now Available < Exit [It] verifies that default openshift-gitops Argo CD instance becomes available after modifying .spec.controller.processors.operation value - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-004_validate_argocd_installation_test.go:36 @ 11/10/25 16:30:33.875 (34.321s) > Enter [BeforeEach] 1-071_validate_node_selectors - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:30 @ 11/10/25 16:30:33.875 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-071_validate_node_selectors - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:30 @ 11/10/25 16:30:44.434 (10.559s) > Enter [It] verifies changes to GitOpsService's nodeselector, tolerations, and runOnInfra will modify Argo CD Deployments and StatefulSets - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:37 @ 11/10/25 16:30:44.434 STEP: ensuring Deployments and StatefulSets have nodeSelector of 'kubernetes.io/os: linux' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:39 @ 11/10/25 16:30:44.434 Object exists in ExistByName: cluster Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-dex-server Object exists in ExistByName: openshift-gitops-redis Object exists in ExistByName: openshift-gitops-application-controller STEP: adding 'nodeSelector: {key1: value1}' to GitOpsService CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:53 @ 11/10/25 16:30:44.674 Object exists in ExistByName: cluster STEP: ensuring Deployments and StatefulSets pick up the change we made to nodeSelector in GitOpsService CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:68 @ 11/10/25 16:30:44.765 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux] actual: map[key1:value1 kubernetes.io/os:linux] STEP: enabling runOnInfra and setting various tolerations on GitOpsService - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:83 @ 11/10/25 16:30:48.064 STEP: ensuring Deployments and StatefulSets pick up the change to nodeSelector and tolerations - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:93 @ 11/10/25 16:30:48.118 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [{infra reserved NoSchedule <nil>}] STEP: removing all our previous changes from GitOpsService - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:120 @ 11/10/25 16:30:51.665 STEP: ensuring Deployments and StatefulSets have the nodeSelector and tolerations removed - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:128 @ 11/10/25 16:30:51.717 HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] HaveTemplateSpecNodeSelector - expected: map[key1:value1 kubernetes.io/os:linux node-role.kubernetes.io/infra:] actual: map[kubernetes.io/os:linux] HaveTolerations - expected: [{infra reserved NoSchedule <nil>}] actual: [] Object does not exists in ExistByName: openshift-gitops-application-controller statefulsets.apps "openshift-gitops-application-controller" not found Object exists in ExistByName: openshift-gitops-application-controller StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 0 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 < Exit [It] verifies changes to GitOpsService's nodeselector, tolerations, and runOnInfra will modify Argo CD Deployments and StatefulSets - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-071_validate_node_selectors_test.go:37 @ 11/10/25 16:31:23.736 (39.303s) > Enter [BeforeEach] 1-036_validate_role_rolebinding_for_source_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:33 @ 11/10/25 16:31:23.736 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-036_validate_role_rolebinding_for_source_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:33 @ 11/10/25 16:31:34.259 (10.523s) > Enter [It] verifies that ArgoCD CR '.spec.sourceNamespaces' field wildcard-matching matches and manages only namespaces which match the wildcard - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:55 @ 11/10/25 16:31:34.259 STEP: creating test NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:57 @ 11/10/25 16:31:34.259 STEP: creating Argo CD instance in default NS, with 'test' sourceNamespace only - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:61 @ 11/10/25 16:31:34.311 STEP: verifying Argo CD instance starts managing the namespace via managed-by-cluster-argocd label - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:75 @ 11/10/25 16:31:34.355 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:31:37.455 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: creating test-1 and dev NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:123 @ 11/10/25 16:31:37.53 STEP: updating Argo CD sourceNamespaces to test*, which should match test-1 and test but not dev - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:130 @ 11/10/25 16:31:37.641 STEP: verifying test-1 NS becomes managed, and expected role/rolebindings exist in test* namespaces but not dev - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:135 @ 11/10/25 16:31:44.704 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:31:44.762 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: verifying Role/RoleBinding for example-argocd_test-1 in test-1 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:31:44.847 Object exists in ExistByName: example-argocd_test-1 Object exists in ExistByName: example-argocd_test-1 STEP: creating a new test-2 NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:159 @ 11/10/25 16:32:04.923 STEP: verifying the test-2 namespace becomes managed by the argo cd instance, and has the expected role/rolebinding - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:163 @ 11/10/25 16:32:04.997 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test-2 in test-2 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:32:10.112 Object exists in ExistByName: example-argocd_test-2 Object exists in ExistByName: example-argocd_test-2 STEP: adding ALL namespaces ('*') to source namespaces of Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:170 @ 11/10/25 16:32:10.2 STEP: verifying test, test-1, test-2, and dev are all managed and have the expected roles - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:175 @ 11/10/25 16:32:17.271 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test in test namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:32:57.519 Object exists in ExistByName: example-argocd_test Object exists in ExistByName: example-argocd_test STEP: verifying Role/RoleBinding for example-argocd_test-1 in test-1 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:32:57.62 Object exists in ExistByName: example-argocd_test-1 Object exists in ExistByName: example-argocd_test-1 STEP: verifying Role/RoleBinding for example-argocd_test-2 in test-2 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:32:57.711 Object exists in ExistByName: example-argocd_test-2 Object exists in ExistByName: example-argocd_test-2 STEP: verifying Role/RoleBinding for example-argocd_dev in dev namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:32:57.801 Object exists in ExistByName: example-argocd_dev Object exists in ExistByName: example-argocd_dev STEP: setting Argo CD instance sourceNamespaces to 'test-ns*' and 'dev-ns*' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:195 @ 11/10/25 16:32:57.891 STEP: creating test-ns-1, dev-ns-1, and other-ns namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:200 @ 11/10/25 16:33:04.966 STEP: verifying test-ns-1 and dev-ns-1 are managed, but other-ns isn't - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:210 @ 11/10/25 16:33:05.186 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: default STEP: verifying Role/RoleBinding for example-argocd_test-ns-1 in test-ns-1 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:33:25.292 Object exists in ExistByName: example-argocd_test-ns-1 Object exists in ExistByName: example-argocd_test-ns-1 STEP: verifying Role/RoleBinding for example-argocd_dev-ns-1 in dev-ns-1 namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:80 @ 11/10/25 16:33:25.391 Object exists in ExistByName: example-argocd_dev-ns-1 Object exists in ExistByName: example-argocd_dev-ns-1 STEP: setting Argo CD instance sourceNamespaces to 'test-ns*' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:235 @ 11/10/25 16:33:45.48 STEP: verifying dev-ns-1 eventually becomes unmanaged - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:241 @ 11/10/25 16:33:52.557 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: default / Actual: < Exit [It] verifies that ArgoCD CR '.spec.sourceNamespaces' field wildcard-matching matches and manages only namespaces which match the wildcard - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:55 @ 11/10/25 16:34:22.625 (2m48.366s) > Enter [AfterEach] 1-036_validate_role_rolebinding_for_source_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:40 @ 11/10/25 16:34:22.625 < Exit [AfterEach] 1-036_validate_role_rolebinding_for_source_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-036_validate_role_rolebinding_for_source_namespace_test.go:40 @ 11/10/25 16:34:23.002 (376ms) > Enter [BeforeEach] 1-052_validate_rolebinding_number - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:34 @ 11/10/25 16:34:23.002 Deleting Namespace dev Deleting Namespace dev-ns-1 Deleting Namespace other-ns Deleting Namespace test Deleting Namespace test-1 Deleting Namespace test-2 Deleting Namespace test-ns-1 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-052_validate_rolebinding_number - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:34 @ 11/10/25 16:34:44.669 (21.667s) > Enter [It] verifies RoleBindings are added to namespace-scoped Namespace when that Namespace is managed by openshift-gitops - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:38 @ 11/10/25 16:34:44.669 STEP: creating simple namespace-scoped Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:40 @ 11/10/25 16:34:44.669 Object does not exists in ExistByName: openshift-gitops-argocd-application-controller rolebindings.rbac.authorization.k8s.io "openshift-gitops-argocd-application-controller" not found Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-application-controller Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server Object exists in ExistByName: openshift-gitops-argocd-server < Exit [It] verifies RoleBindings are added to namespace-scoped Namespace when that Namespace is managed by openshift-gitops - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-052_validate_rolebinding_number_test.go:38 @ 11/10/25 16:35:26.033 (41.364s) > Enter [BeforeEach] 1-102_validate_handle_terminating_namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:48 @ 11/10/25 16:35:26.033 Deleting Namespace gitops-e2e-test-d5f19383-99ad Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-102_validate_handle_terminating_namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:48 @ 11/10/25 16:35:46.735 (20.702s) > Enter [It] ensures that if one managed-by namespace is stuck in terminating, it does not prevent other managed-by namespaces from being managed or deployed to - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:55 @ 11/10/25 16:35:46.735 STEP: creating simple namespace-scoped Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:57 @ 11/10/25 16:35:46.735 STEP: waiting for ArgoCD CR to be reconciled and the instance to be ready - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:67 @ 11/10/25 16:35:46.845 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a namespace 'jane' containing a ConfigMap with a unowned finalizer - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:70 @ 11/10/25 16:36:22.294 STEP: deleting the jane NS in a background go routine, which puts the jane NS into a simulated stuck in terminating state - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:86 @ 11/10/25 16:36:22.372 STEP: verifying jane ns moves into terminating state - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:92 @ 11/10/25 16:36:22.372 Namespace - HavePhase: Expected: Terminating / Actual: Terminating STEP: creating John NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:95 @ 11/10/25 16:36:22.419 STEP: Wait for managed-by rolebindings to be created in John NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:99 @ 11/10/25 16:36:22.482 argocd-server RoleBinding not yet found STEP: creating a test Argo CD Application targeting john NS - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:134 @ 11/10/25 16:36:25.516 STEP: verifying Argo CD is successfully able to deploy to the John Namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:159 @ 11/10/25 16:36:25.534 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced < Exit [It] ensures that if one managed-by namespace is stuck in terminating, it does not prevent other managed-by namespaces from being managed or deployed to - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-102_validate_handle_terminating_namespaces_test.go:55 @ 11/10/25 16:36:35.948 (49.213s) > Enter [BeforeEach] 1-003_validate_cluster_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:48 @ 11/10/25 16:36:35.948 Deleting Namespace gitops-e2e-test-e42d0ad3-a2d3 Deleting Namespace jane Deleting Namespace john Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-003_validate_cluster_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:48 @ 11/10/25 16:37:06.677 (30.728s) > Enter [It] verifies that adding namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES will cause clusterrole and clusterrolebinding to be created for server, app controller, and application set - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:66 @ 11/10/25 16:37:06.677 STEP: creating simple namespace-scoped ArgoCD instance .spec.initialSSHKnownHosts set - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:75 @ 11/10/25 16:37:06.742 STEP: adding argocd-e2e-cluster-config to ARGOCD_CLUSTER_CONFIG_NAMESPACES - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:87 @ 11/10/25 16:37:06.79 STEP: verifying ClusterRole/Binding were created for argocd-e2e-cluster-config server/app controller components, now that the namespace is specified in the CLUSTER_CONFIG env var - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:91 @ 11/10/25 16:37:06.92 Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object does not exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller clusterroles.rbac.authorization.k8s.io "example-argocd-argocd-e2e-cluster-config-argocd-application-controller" not found Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-application-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-server Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-server ArgoCD status is now Available HaveServerStatus: expected: Running / actual: Running STEP: verifying that the initialSSHKnownHosts value was set in the ConfigMap - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:107 @ 11/10/25 16:37:47.67 Object exists in ExistByName: argocd-ssh-known-hosts-cm HaveStringDataKeyValue: ConfigMag key ssh_known_hosts Have: github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ== Expected: github.com ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ== STEP: adding source namespaces and additional SCM providers to applications to controller - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:118 @ 11/10/25 16:37:47.76 STEP: verifying applicationset controller becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:132 @ 11/10/25 16:37:54.832 ArgoCD status is now Available HaveApplicationSetControllerStatus: expected: Running / actual: Running STEP: verifying ClusterRole/RoleBinding were created for the argocd-e2e-cluster-config namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:136 @ 11/10/25 16:38:04.965 Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-applicationset-controller Object exists in ExistByName: example-argocd-argocd-e2e-cluster-config-argocd-applicationset-controller < Exit [It] verifies that adding namespaces to ARGOCD_CLUSTER_CONFIG_NAMESPACES will cause clusterrole and clusterrolebinding to be created for server, app controller, and application set - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:66 @ 11/10/25 16:38:05.055 (58.379s) > Enter [AfterEach] 1-003_validate_cluster_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:54 @ 11/10/25 16:38:05.055 < Exit [AfterEach] 1-003_validate_cluster_config - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-003_validate_cluster_config_test.go:54 @ 11/10/25 16:38:05.246 (191ms) > Enter [BeforeEach] 1-110_validate_podsecurity_alerts - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-110_validate_podsecurity_alerts_test.go:16 @ 11/10/25 16:38:05.246 Deleting Namespace argocd-e2e-cluster-config Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-110_validate_podsecurity_alerts - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-110_validate_podsecurity_alerts_test.go:16 @ 11/10/25 16:38:35.915 (30.668s) > Enter [It] verifies openshift-gitops Namespace has expected pod-security labels - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-110_validate_podsecurity_alerts_test.go:20 @ 11/10/25 16:38:35.915 Object exists in ExistByName: openshift-gitops HaveLabelWithValue - Key pod-security.kubernetes.io/audit Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/audit-version Expect: latest / Have: latest HaveLabelWithValue - Key pod-security.kubernetes.io/enforce Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/enforce-version Expect: v1.29 / Have: v1.29 HaveLabelWithValue - Key pod-security.kubernetes.io/warn Expect: restricted / Have: restricted HaveLabelWithValue - Key pod-security.kubernetes.io/warn-version Expect: latest / Have: latest < Exit [It] verifies openshift-gitops Namespace has expected pod-security labels - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-110_validate_podsecurity_alerts_test.go:20 @ 11/10/25 16:38:36.248 (333ms) > Enter [BeforeEach] 1-037_validate_applicationset_in_any_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:34 @ 11/10/25 16:38:36.248 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-037_validate_applicationset_in_any_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:34 @ 11/10/25 16:38:46.859 (10.611s) > Enter [It] verifying that ArgoCD CR '.spec.applicationset.sourcenamespaces' and '.spec.sourcenamespaces' correctly control role/rolebindings within the managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:52 @ 11/10/25 16:38:46.859 STEP: 0) create namespaces: appset-argocd, appset-old-ns, appset-new-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:54 @ 11/10/25 16:38:46.859 STEP: 1) create Argo CD instance with no source namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:67 @ 11/10/25 16:38:47.062 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available HaveApplicationSetControllerStatus: expected: Running / actual: Running STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:90 @ 11/10/25 16:39:22.605 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:119 @ 11/10/25 16:40:02.821 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 2) modifying ArgoCD to have one sourceNamespace: appset-old-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:129 @ 11/10/25 16:40:12.879 ArgoCD status is now Available STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:90 @ 11/10/25 16:40:30.032 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:119 @ 11/10/25 16:41:10.248 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 3) modifying ArgoCD to have 2 sourceNamespaces: appset-old-ns, appset-new-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:149 @ 11/10/25 16:41:20.309 ArgoCD status is now Available STEP: verifying that expected Role/Rolebindings [example_appset-new-ns example-appset-argocd-applicationset] exist in appset-new-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:90 @ 11/10/25 16:41:37.475 STEP: verifying that namespaceappset-new-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:119 @ 11/10/25 16:42:17.708 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:90 @ 11/10/25 16:42:27.766 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:119 @ 11/10/25 16:43:07.994 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 4) Add a sourceNamespace of 'appset-new-ns' to ArgoCD CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:171 @ 11/10/25 16:43:18.053 STEP: verifying that Role in appset-new-ns has expected RBAC permissions: ability to modify applications, batch, and applicationsets - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:189 @ 11/10/25 16:43:25.133 Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] STEP: verifying RoleBinding for argocd-server and argocd-application-controller exists in appset-new-ns namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:233 @ 11/10/25 16:43:25.256 Object exists in ExistByName: example_appset-new-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset STEP: verifying appset-new-ns namespace is managed as both a source namespace and an application set source namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:276 @ 11/10/25 16:43:25.388 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: verifying that expected Role/Rolebindings [example_appset-old-ns example-appset-argocd-applicationset] exist in appset-old-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:90 @ 11/10/25 16:43:25.479 STEP: verifying that namespaceappset-old-ns does not have label 'argocd.argoproj.io/applicationset-managed-by-cluster-argocd': 'appset-argocd' - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:119 @ 11/10/25 16:44:05.688 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 5) Adds 'appset-old-ns' to spec.sourceNamespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:287 @ 11/10/25 16:44:15.746 STEP: verifying that appset-old-ns gains Role/RoleBindings similar to appset-new-ns - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:306 @ 11/10/25 16:44:22.828 HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] Object exists in ExistByName: example_appset-old-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []} {[create get list patch update watch delete] [argoproj.io] [applicationsets] [] []}] Object exists in ExistByName: example_appset-new-ns Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Object exists in ExistByName: example-appset-argocd-applicationset Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: 6) Remove 'appset-new-ns' from .spec.appliationSet.sourceNamespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:472 @ 11/10/25 16:44:43.319 STEP: verifying that applicationsets has been removed from Role - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:490 @ 11/10/25 16:44:50.376 Object exists in ExistByName: example_appset-new-ns HaveRules - Expected: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []}] / Actual: [{[create get list patch update watch delete] [argoproj.io] [applications] [] []} {[create update] [batch] [jobs cronjobs cronjobs/finalizers] [] []}] STEP: verifying RoleBinding still has expected role and subjects - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:517 @ 11/10/25 16:44:50.482 Object exists in ExistByName: example_appset-new-ns STEP: verifying appset-new-ns namespace should still be managed-by-cluster-argocd - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:537 @ 11/10/25 16:44:50.589 Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: appset-argocd STEP: verifying appset-new-ns applicationset role/binding no longer exists in the namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:540 @ 11/10/25 16:44:50.645 STEP: verifying appset-new-ns applicationset is not applicationset-managed-by Argo CD instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:547 @ 11/10/25 16:45:10.755 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: STEP: 7) Remove all .spec.sourceNamespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:553 @ 11/10/25 16:45:20.811 STEP: verifying role/rolebinding no longer exists in any namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:568 @ 11/10/25 16:45:27.893 STEP: verifying applicationset-managed-by and managed-by are not set on any namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:584 @ 11/10/25 16:46:28.239 Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/applicationset-managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by-cluster-argocd Expected: appset-argocd / Actual: < Exit [It] verifying that ArgoCD CR '.spec.applicationset.sourcenamespaces' and '.spec.sourcenamespaces' correctly control role/rolebindings within the managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:52 @ 11/10/25 16:46:58.406 (8m11.547s) > Enter [AfterEach] 1-037_validate_applicationset_in_any_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:41 @ 11/10/25 16:46:58.406 < Exit [AfterEach] 1-037_validate_applicationset_in_any_namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-037_validate_applicationset_in_any_namespace_test.go:41 @ 11/10/25 16:46:58.561 (155ms) > Enter [BeforeEach] 1-105_validate_label_selector - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:29 @ 11/10/25 16:46:58.561 Deleting Namespace appset-argocd Deleting Namespace appset-new-ns Deleting Namespace appset-old-ns Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-105_validate_label_selector - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:29 @ 11/10/25 16:47:29.268 (30.707s) > Enter [It] ensures that ARGOCD_LABEL_SELECTOR controls which ArgoCD CRs are reconciled via operator - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:36 @ 11/10/25 16:47:29.268 STEP: adding ARGOCD_LABEL_SELECTOR foo=bar to Operator - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:43 @ 11/10/25 16:47:29.268 STEP: creating new namespace-scoped ArgoCD instance in test-argocd - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:50 @ 11/10/25 16:47:29.392 Deleting Namespace test-argocd ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available STEP: adding foo=bar label to ArgoCD, which should now cause the ArgoCD to be reconciled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:65 @ 11/10/25 16:49:59.569 STEP: verifying that ArgoCD becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:74 @ 11/10/25 16:50:06.662 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: adding custom rbac to .spec.rbac of ArgoCD - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:77 @ 11/10/25 16:50:37.032 STEP: verifying ArgoCD becomes available after .spec update and that argocd-rbac-cm ConfigMap has expected values from ArgoCD CR rbac field - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:86 @ 11/10/25 16:50:44.099 ArgoCD status is now Available Object exists in ExistByName: argocd-rbac-cm STEP: removing foo label from ArgoCD - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:96 @ 11/10/25 16:50:54.212 STEP: updating RBAC policy field of ArgoCD - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:101 @ 11/10/25 16:51:01.282 STEP: verifying that Argo CD argocd-rbac-cm ConfigMap has not changed, since ArgoCD does not have the required foo=bar label - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:110 @ 11/10/25 16:51:08.377 Object exists in ExistByName: argocd-rbac-cm Waiting: {ARGOCD_LABEL_SELECTOR foo=bar nil} is still present in Deployment openshift-gitops-operator-controller-manager < Exit [It] ensures that ARGOCD_LABEL_SELECTOR controls which ArgoCD CRs are reconciled via operator - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-105_validate_label_selector_test.go:36 @ 11/10/25 16:51:32.062 (4m2.794s) > Enter [BeforeEach] 1-111_validate_default_argocd_route - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:22 @ 11/10/25 16:51:32.062 Deleting Namespace test-argocd Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-111_validate_default_argocd_route - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:22 @ 11/10/25 16:52:02.858 (30.796s) > Enter [It] ensuring that default openshift-gitops instance has expected default Argo CD server route, and that it is possible to modify the values on that default instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:27 @ 11/10/25 16:52:02.858 STEP: verifying route of openshift-gitops Argo CD instance has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:29 @ 11/10/25 16:52:02.858 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server STEP: verifying Route has admitted ingress - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:59 @ 11/10/25 16:52:13.037 HaveAdmittedIngress - value: true STEP: verifying the argocd-server-tls secret is created by the OpenShift's service CA - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:62 @ 11/10/25 16:52:13.082 Object exists in ExistByName: argocd-server-tls STEP: updating ArgoCD CR server route to TLS passthrough and TLS termination policy of none - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:73 @ 11/10/25 16:52:13.126 STEP: verifying server Route has changed to the TLS new values from ArgoCD CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:86 @ 11/10/25 16:52:20.199 ArgoCD status is now Available Object exists in ExistByName: openshift-gitops-server < Exit [It] ensuring that default openshift-gitops instance has expected default Argo CD server route, and that it is possible to modify the values on that default instance - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-111_validate_default_argocd_route_test.go:27 @ 11/10/25 16:52:37.386 (34.529s) > Enter [BeforeEach] 1-005_validate_metrics_test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:18 @ 11/10/25 16:52:37.386 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-005_validate_metrics_test - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:18 @ 11/10/25 16:52:48.008 (10.622s) > Enter [It] verifies that default ServiceMonitors exist in openshift-gitops and PrometheusRule ArgoCDSyncAlert exists - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:22 @ 11/10/25 16:52:48.008 STEP: verifying openshift-gitops ServiceMonitor exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:24 @ 11/10/25 16:52:48.008 Object exists in ExistByName: openshift-gitops STEP: verifying openshift-gitops-repo-server ServiceMonitor exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:46 @ 11/10/25 16:52:48.062 Object exists in ExistByName: openshift-gitops-repo-server STEP: verifying openshift-gitops-server ServiceMonitor exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:68 @ 11/10/25 16:52:48.106 Object exists in ExistByName: openshift-gitops-server STEP: verifying PrometheusRule gitops-operator-argocd-alerts exists and has expected values - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:90 @ 11/10/25 16:52:48.15 Object exists in ExistByName: gitops-operator-argocd-alerts < Exit [It] verifies that default ServiceMonitors exist in openshift-gitops and PrometheusRule ArgoCDSyncAlert exists - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-005_validate_metrics_test.go:22 @ 11/10/25 16:52:48.195 (186ms) > Enter [BeforeEach] 1-002-validate_backend_service - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:18 @ 11/10/25 16:52:48.195 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-002-validate_backend_service - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:18 @ 11/10/25 16:52:58.803 (10.608s) > Enter [It] validates backend service permissions - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:22 @ 11/10/25 16:52:58.803 STEP: checking the openshift-gitops namespace installed by default - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:24 @ 11/10/25 16:52:58.803 Object exists in ExistByName: openshift-gitops STEP: checking we have a cluster deployment in the namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:27 @ 11/10/25 16:52:58.842 Object exists in ExistByName: cluster Deployment cluster - HaveReplicas: expected: 1 actual: 1 Deployment cluster - HaveReadyReplicas: expected: 1 actual: 1 STEP: checking Service for cluster exists - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:33 @ 11/10/25 16:52:58.96 Object exists in ExistByName: cluster < Exit [It] validates backend service permissions - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-002-validate_backend_service_test.go:22 @ 11/10/25 16:52:59 (197ms) > Enter [BeforeEach] 1-027_validate_operand_from_git - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:51 @ 11/10/25 16:52:59 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-027_validate_operand_from_git - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:51 @ 11/10/25 16:53:09.625 (10.625s) > Enter [It] verifies that a custom Argo CD instance can be deployed by the 'openshift-gitops' Argo CD instance. It also verfies that the custom Argo CD instance is able to deploy a simple application - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:57 @ 11/10/25 16:53:09.625 STEP: verifying openshift-gitops Argo CD instance is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:62 @ 11/10/25 16:53:09.664 ArgoCD status is now Available STEP: creating Argo CD Application in openshift-gitops namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:65 @ 11/10/25 16:53:19.724 STEP: verifying test-1-27-custom NS is created and is managed by openshift-gitops, and Application deploys successfully - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:93 @ 11/10/25 16:53:19.763 Object does not exists in ExistByName: test-1-27-custom namespaces "test-1-27-custom" not found Object exists in ExistByName: test-1-27-custom Namespace - HaveLabel: Key: argocd.argoproj.io/managed-by Expected: openshift-gitops / Actual: openshift-gitops HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Argo CD instance deployed by Argo CD becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:107 @ 11/10/25 16:53:24.982 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: creating a new simple Argo CD Application which deploys a simple guestbook app. The Application is defined in 'test-1-27-custom namespace'. That namespace is also where the guestbook application resources are deployed. - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:116 @ 11/10/25 16:54:00.361 STEP: verifying expected Argo CD workloads exist in test-1-27-custom namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:140 @ 11/10/25 16:54:00.376 Object exists in ExistByName: argocd-redis Deployment argocd-redis - HaveReplicas: expected: 1 actual: 1 Deployment argocd-redis - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-server Deployment argocd-server - HaveReplicas: expected: 1 actual: 1 Deployment argocd-server - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-repo-server Deployment argocd-repo-server - HaveReplicas: expected: 1 actual: 1 Deployment argocd-repo-server - HaveReadyReplicas: expected: 1 actual: 1 Object does not exists in ExistByName: nginx-deployment deployments.apps "nginx-deployment" not found Object does not exists in ExistByName: nginx-deployment deployments.apps "nginx-deployment" not found Object exists in ExistByName: nginx-deployment Deployment nginx-deployment - HaveReplicas: expected: 1 actual: 1 Deployment nginx-deployment - HaveReadyReplicas: expected: 1 actual: 1 Object exists in ExistByName: argocd-application-controller StatefulSet HaveReplicas: expected: 1 actual: 1 StatefulSet HaveReadyReplicas: expected: 1 actual: 1 STEP: verifying Argo CD instance in test-1-27-custom is available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:154 @ 11/10/25 16:54:07.085 ArgoCD status is now Available STEP: verifying both Argo CD Applications are able to sucessfully deploy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:157 @ 11/10/25 16:54:17.153 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced < Exit [It] verifies that a custom Argo CD instance can be deployed by the 'openshift-gitops' Argo CD instance. It also verfies that the custom Argo CD instance is able to deploy a simple application - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-027_validate_operand_from_git_test.go:57 @ 11/10/25 16:54:17.353 (1m7.728s) > Enter [BeforeEach] 1-086_validate_default_argocd_role - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:29 @ 11/10/25 16:54:17.354 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-086_validate_default_argocd_role - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:29 @ 11/10/25 16:54:27.883 (10.53s) > Enter [It] verifies that Argo CD roles are defined as expected in argocd-rbac-cm, based on values in ArgoCD .spec.rbac.defaultPolicy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:36 @ 11/10/25 16:54:27.883 STEP: verifying default ArgoCD in openshift-gitops is running and has defined expected RBAC values in ConfigMap argocd-rbac-cm - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:38 @ 11/10/25 16:54:27.883 ArgoCD status is now Available Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: openshift-gitops / Have: openshift-gitops HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd STEP: creating 3 ArgoCD instances in 3 different namespaces, with different RBAC policies - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:58 @ 11/10/25 16:54:38.151 STEP: verifying Argo CD instances become available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:106 @ 11/10/25 16:54:38.411 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available ArgoCD status is now Available ArgoCD status is now Available STEP: verifying argocd-rbac-cm ConfigMap contains the expected values in each namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:112 @ 11/10/25 16:55:33.911 Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy / Have: argocd-default-policy HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy-empty / Have: argocd-default-policy-empty HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd Object exists in ExistByName: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/managed-by Expect: argocd-default-policy-admin / Have: argocd-default-policy-admin HaveLabelWithValue - Key app.kubernetes.io/name Expect: argocd-rbac-cm / Have: argocd-rbac-cm HaveLabelWithValue - Key app.kubernetes.io/part-of Expect: argocd / Have: argocd < Exit [It] verifies that Argo CD roles are defined as expected in argocd-rbac-cm, based on values in ArgoCD .spec.rbac.defaultPolicy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-086_validate_default_argocd_role_test.go:36 @ 11/10/25 16:55:34.387 (1m6.504s) > Enter [BeforeEach] 1-107_validate_redis_scc - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:28 @ 11/10/25 16:55:34.387 Deleting Namespace test-1-086-custom Deleting Namespace test-1-086-custom2 Deleting Namespace test-1-086-custom3 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-107_validate_redis_scc - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:28 @ 11/10/25 16:56:45.029 (1m10.642s) > Enter [It] verifies that when Argo CD has HA enabled that the redis pods use restricted-v2 security policy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:35 @ 11/10/25 16:56:45.029 STEP: verifying we are running on a cluster with at least 3 nodes. This is required for Redis HA - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:37 @ 11/10/25 16:56:45.029 ExpectHasAtLeastXNodes, expected: 3 actual: 6 STEP: creating simple namespace-scoped Argo CD instance with HA enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:41 @ 11/10/25 16:56:45.081 STEP: verifying HA Redis becomes available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:54 @ 11/10/25 16:56:45.198 HaveRedisStatus: expected: Running / actual: HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Pending HaveRedisStatus: expected: Running / actual: Running STEP: verifying that argocd-redis-ha pod has scc of restricted-v2 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:57 @ 11/10/25 16:58:41.717 STEP: verifying that argocd-redis-ha-haproxy pod has scc of restricted-v2 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:71 @ 11/10/25 16:58:41.73 < Exit [It] verifies that when Argo CD has HA enabled that the redis pods use restricted-v2 security policy - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-107_validate_redis_scc_test.go:35 @ 11/10/25 16:58:41.774 (1m56.744s) > Enter [BeforeEach] 1-106_validate_argocd_metrics_controller - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:21 @ 11/10/25 16:58:41.774 Deleting Namespace gitops-e2e-test-d6313806-7d24 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-106_validate_argocd_metrics_controller - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:21 @ 11/10/25 16:59:47.351 (1m5.577s) > Enter [It] verifies Argo CD metrics can be disabled and re-enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:50 @ 11/10/25 16:59:47.351 STEP: verifying Argo CD metrics are enabled by default in openshift-gitops - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:52 @ 11/10/25 16:59:47.351 ArgoCD status is now Available HaveLabelWithValue - Key openshift.io/cluster-monitoring Expect: true / Have: true Object exists in ExistByName: openshift-gitops Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-read Object exists in ExistByName: openshift-gitops-prometheus-k8s-read-binding Object exists in ExistByName: gitops-operator-argocd-alerts STEP: disabling metrics via ArgoCD CR .spec.monitoring.disableMetrics - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:60 @ 11/10/25 16:59:57.725 STEP: verifying all metrics resources are in disabled state - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:66 @ 11/10/25 17:00:04.789 STEP: re-enabling metrics - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:84 @ 11/10/25 17:00:15.091 STEP: verifying metrics are re-enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:89 @ 11/10/25 17:00:22.155 HaveLabelWithValue - Key openshift.io/cluster-monitoring Expect: true / Have: true Object exists in ExistByName: openshift-gitops Object exists in ExistByName: openshift-gitops-repo-server Object exists in ExistByName: openshift-gitops-server Object exists in ExistByName: openshift-gitops-read Object exists in ExistByName: openshift-gitops-prometheus-k8s-read-binding Object exists in ExistByName: gitops-operator-argocd-alerts < Exit [It] verifies Argo CD metrics can be disabled and re-enabled - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-106_validate_argocd_metrics_controller_test.go:50 @ 11/10/25 17:00:22.441 (35.09s) > Enter [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:00:22.441 Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:00:33.13 (10.689s) > Enter [It] should create Roles/RoleBindings when namespaceManagement is enabled from ArgoCD NamespaceManagement field - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:183 @ 11/10/25 17:00:33.13 STEP: Create ArgoCD with namespaceManagement field set to true - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:189 @ 11/10/25 17:00:33.13 STEP: waiting for Argo CD to be available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:72 @ 11/10/25 17:00:33.189 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespaceManagement via env var - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:194 @ 11/10/25 17:01:08.569 STEP: Create namespaceManagement CR with the namespace which needs to be managed - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:197 @ 11/10/25 17:01:08.673 STEP: Verify Roles/RoleBindings are created for managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:204 @ 11/10/25 17:01:08.688 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Verify Application and Secret of managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:207 @ 11/10/25 17:01:39.18 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:103 @ 11/10/25 17:01:39.18 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-104e74cb-aed3,test-113-custom / Have: gitops-e2e-test-104e74cb-aed3,test-113-custom STEP: creating Argo CD Application targeting the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:141 @ 11/10/25 17:01:49.258 STEP: verifying that Argo CD is able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:173 @ 11/10/25 17:01:49.284 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced < Exit [It] should create Roles/RoleBindings when namespaceManagement is enabled from ArgoCD NamespaceManagement field - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:183 @ 11/10/25 17:01:59.511 (1m26.381s) > Enter [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:01:59.511 Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager < Exit [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:02:14.21 (14.698s) > Enter [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:02:14.21 Deleting Namespace gitops-e2e-test-104e74cb-aed3 Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:02:45.096 (30.886s) > Enter [It] should not create Roles/RoleBindings when namespaceManagement env var is not set - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:211 @ 11/10/25 17:02:45.096 STEP: Create ArgoCD with namespaceManagement field set to true - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:217 @ 11/10/25 17:02:45.096 STEP: waiting for Argo CD to be available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:72 @ 11/10/25 17:02:45.145 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Create namespaceManagement CR with the namespace which needs to be managed - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:222 @ 11/10/25 17:03:20.591 STEP: Verify Roles/RoleBindings are created for managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:229 @ 11/10/25 17:03:20.608 STEP: Verify Application and Secret of managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:232 @ 11/10/25 17:03:50.769 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:103 @ 11/10/25 17:03:50.769 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-5571e6a3-544a / Have: gitops-e2e-test-5571e6a3-544a STEP: creating Argo CD Application targeting the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:141 @ 11/10/25 17:04:00.874 STEP: verifying that Argo CD is NOT able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:177 @ 11/10/25 17:04:00.905 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced < Exit [It] should not create Roles/RoleBindings when namespaceManagement env var is not set - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:211 @ 11/10/25 17:05:00.968 (2m15.872s) > Enter [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:05:00.968 < Exit [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:05:01.268 (301ms) > Enter [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:05:01.269 Deleting Namespace gitops-e2e-test-5571e6a3-544a Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:05:32.174 (30.905s) > Enter [It] Should not create Roles/RoleBindings when namespaceManagement is disabled via the ArgoCD NamespaceManagement.AllowManagedBy field. - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:236 @ 11/10/25 17:05:32.174 STEP: Create ArgoCD with namespaceManagement field set to false - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:242 @ 11/10/25 17:05:32.174 STEP: waiting for Argo CD to be available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:72 @ 11/10/25 17:05:32.222 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespace management via env var - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:247 @ 11/10/25 17:06:07.657 STEP: Create namespaceManagement CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:250 @ 11/10/25 17:06:07.784 STEP: Verify Roles/RoleBindings are not created for managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:257 @ 11/10/25 17:06:07.804 STEP: Verify Application and Secret of managed namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:260 @ 11/10/25 17:06:37.962 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:103 @ 11/10/25 17:06:37.962 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-d7db4707-a82a / Have: gitops-e2e-test-d7db4707-a82a STEP: creating Argo CD Application targeting the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:141 @ 11/10/25 17:06:48.063 STEP: verifying that Argo CD is NOT able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:177 @ 11/10/25 17:06:48.095 HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced HaveSyncStatusCode - current syncStatusCode: Unknown / expected syncStatusCode: Synced < Exit [It] Should not create Roles/RoleBindings when namespaceManagement is disabled via the ArgoCD NamespaceManagement.AllowManagedBy field. - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:236 @ 11/10/25 17:07:48.154 (2m15.98s) > Enter [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:07:48.154 Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager < Exit [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:08:02.884 (14.73s) [TIMEDOUT] A suite timeout occurred In [AfterEach] at: /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.676 This is the Progress Report generated when the suite timeout occurred: GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should support glob pattern(test-*) matching for managed namespaces (Spec Runtime: 2m43.792s) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 In [AfterEach] (Node Runtime: 451ms) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 Spec Goroutine goroutine 7104 [select] github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000438850, {0x438fec8, 0xc001ca83e0}, 0x1, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:546 github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000438850, {0x438fec8, 0xc001ca83e0}, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:145 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.waitForAllEnvVarsToBeRemovedFromDeployments({0x3d7ddf4, 0x19}, {0xc003c92d20, 0x5, 0x5}, {0x43b47e0, 0xc00431acf0}) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:603 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.RestoreSubcriptionToDefault() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:553 > github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential.init.func43.1.2() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:61 | defer fixture.RestoreSubcriptionToDefault() // revert Subscription at end of test | fixture.OutputDebugOnFail(randomNS.Name, nsCustom.Name) > }) | | deployArgoCD := func(namespace string, managedNamespaces []argov1beta1api.ManagedNamespaces) *argov1beta1api.ArgoCD { github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x1c67066?, 0xc002010180?}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/node.go:475 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:894 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 32 /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:881 > Enter [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:08:02.884 Deleting Namespace gitops-e2e-test-d7db4707-a82a Deleting Namespace test-113-custom Deleting Namespace test-second-nms Object exists in ExistByName: openshift-gitops ArgoCD status is now Available < Exit [BeforeEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:42 @ 11/10/25 17:08:33.894 (31.01s) > Enter [It] should support glob pattern(test-*) matching for managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 @ 11/10/25 17:08:33.894 STEP: Create ArgoCD with namespaceManagement field set to true - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:270 @ 11/10/25 17:08:33.894 STEP: waiting for Argo CD to be available - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:72 @ 11/10/25 17:08:33.951 ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is not yet Available ArgoCD status is now Available STEP: Enabling namespace management via env var - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:275 @ 11/10/25 17:09:09.382 STEP: Create namespaceManagement CR - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:278 @ 11/10/25 17:09:09.518 STEP: Verify Roles/RoleBindings are created for managed namespace test-113-custom - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:285 @ 11/10/25 17:09:09.535 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Create namespaceManagement CR 2 - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:288 @ 11/10/25 17:09:40.1 STEP: Verify Roles/RoleBindings are created for managed namespace test-second-nms - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:295 @ 11/10/25 17:09:40.117 Object does not exists in ExistByName: argocd-argocd-server roles.rbac.authorization.k8s.io "argocd-argocd-server" not found Object exists in ExistByName: argocd-argocd-server Object exists in ExistByName: argocd-argocd-application-controller Object exists in ExistByName: argocd-argocd-server STEP: Verify Application and Secret of managed namespace test-113-custom - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:298 @ 11/10/25 17:09:45.337 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:103 @ 11/10/25 17:09:45.337 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms STEP: creating Argo CD Application targeting the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:141 @ 11/10/25 17:09:55.445 STEP: verifying that Argo CD is able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:173 @ 11/10/25 17:09:55.477 HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: / expected health: Healthy HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Verify Application and Secret of managed namespace test-second-nms - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:301 @ 11/10/25 17:10:05.727 STEP: verifying that Argo CD eventually includes this other namespace in its Secret list of managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:103 @ 11/10/25 17:10:05.727 Object exists in ExistByName: argocd-default-cluster-config HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms HaveStringDataKeyValue - Key: namespaces Expected: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms / Have: gitops-e2e-test-c29ec8aa-ba53,test-113-custom,test-second-nms STEP: creating Argo CD Application targeting the other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:141 @ 11/10/25 17:10:15.815 STEP: verifying that Argo CD is able to deploy to that other namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:173 @ 11/10/25 17:10:15.83 HaveHealthStatusCode - current health: Healthy / expected health: Healthy HaveSyncStatusCode - current syncStatusCode: Synced / expected syncStatusCode: Synced STEP: Create a namespace that does NOT match glob pattern - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:304 @ 11/10/25 17:10:15.933 STEP: Create namespaceManagement CR in unmanaged namespace (no match expected) - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:308 @ 11/10/25 17:10:15.992 STEP: Verify Roles/RoleBindings are NOT created for unmanaged namespace - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:315 @ 11/10/25 17:10:16.01 < Exit [It] should support glob pattern(test-*) matching for managed namespaces - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 @ 11/10/25 17:10:46.225 (2m12.331s) > Enter [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.225 Waiting: {ALLOW_NAMESPACE_MANAGEMENT_IN_NAMESPACE_SCOPED_INSTANCES true nil} is still present in Deployment openshift-gitops-operator-controller-manager [TIMEDOUT] A suite timeout occurred In [AfterEach] at: /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.676 This is the Progress Report generated when the suite timeout occurred: GitOps Operator Sequential E2E Tests 1-113_validate_namespacemanagement should support glob pattern(test-*) matching for managed namespaces (Spec Runtime: 2m43.792s) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:264 In [AfterEach] (Node Runtime: 451ms) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 Spec Goroutine goroutine 7104 [select] github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000438850, {0x438fec8, 0xc001ca83e0}, 0x1, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:546 github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000438850, {0x438fec8, 0xc001ca83e0}, {0x0, 0x0, 0x0}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/gomega/internal/async_assertion.go:145 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.waitForAllEnvVarsToBeRemovedFromDeployments({0x3d7ddf4, 0x19}, {0xc003c92d20, 0x5, 0x5}, {0x43b47e0, 0xc00431acf0}) /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:603 github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture.RestoreSubcriptionToDefault() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/fixture/fixture.go:553 > github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential.init.func43.1.2() /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:61 | defer fixture.RestoreSubcriptionToDefault() // revert Subscription at end of test | fixture.OutputDebugOnFail(randomNS.Name, nsCustom.Name) > }) | | deployArgoCD := func(namespace string, managedNamespaces []argov1beta1api.ManagedNamespaces) *argov1beta1api.ArgoCD { github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x1c67066?, 0xc002010180?}) /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/node.go:475 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3() /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:894 github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 32 /go/src/github.com/redhat-developer/gitops-operator/vendor/github.com/onsi/ginkgo/v2/internal/suite.go:881 < Exit [AfterEach] 1-113_validate_namespacemanagement - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/1-113_validate_namespacemanagement_test.go:53 @ 11/10/25 17:10:46.676 (451ms) > Enter [AfterSuite] TOP-LEVEL - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:47 @ 11/10/25 17:10:46.677 < Exit [AfterSuite] TOP-LEVEL - /go/src/github.com/redhat-developer/gitops-operator/test/openshift/e2e/ginkgo/sequential/suite_test.go:47 @ 11/10/25 17:10:46.677 (0s) + original_results=/logs/artifacts/original_results/ + mkdir /logs/artifacts/original_results/ + cp openshift-gitops-sequential-e2e.xml /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml + mapTestsForComponentReadiness /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml + [[ true == \t\r\u\e ]] + results_file=/logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml + echo 'Patching Tests Result File: /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml' Patching Tests Result File: /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml + '[' -f /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml ']' + install_yq_if_not_exists + echo 'Checking if yq exists' Checking if yq exists ++ yq --version ++ true + cmd_yq= + '[' -n '' ']' + echo 'Installing yq' Installing yq + mkdir -p /tmp/bin + export PATH=/opt/app-root/src/bin:/opt/app-root/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/tmp/bin/ + PATH=/opt/app-root/src/bin:/opt/app-root/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/tmp/bin/ ++ uname -m ++ sed 's/aarch64/arm64/;s/x86_64/amd64/' + curl -L https://github.com/mikefarah/yq/releases/latest/download/yq_linux_amd64 -o /tmp/bin/yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 55.8M 0 --:--:-- --:--:-- --:--:-- 55.8M + chmod +x /tmp/bin/yq + echo 'Mapping Test Suite Name To: Gitops-lp-interop' Mapping Test Suite Name To: Gitops-lp-interop + yq eval -px -ox -iI0 '.testsuites."+@name" = "Gitops-lp-interop"' /logs/artifacts/original_results//openshift-gitops-sequential-e2e.xml + cp openshift-gitops-sequential-e2e.xml /tmp/secret + exit 1