Versions in this module Expand all Collapse all v1 v1.20.0 Mar 5, 2026 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator Changes in this version + func GetEnv(d *appsv1.Deployment, container string, key string) (*string, error) + func GetTemplateSpecContainerByName(name string, depl appsv1.Deployment) *corev1.Container + func GetTemplateSpecInitContainerByName(name string, depl appsv1.Deployment) *corev1.Container + func HaveAvailableReplicas(availableReplicas int) matcher.GomegaMatcher + func HaveConditionTypeStatus(expectedConditionType appsv1.DeploymentConditionType, ...) matcher.GomegaMatcher + func HaveContainerCommandSubstring(expectedCommandSubstring string, containerIndex int) matcher.GomegaMatcher + func HaveContainerWithEnvVar(envKey string, envValue string, containerIndex int) matcher.GomegaMatcher + func HaveObservedGeneration(observedGeneration int) matcher.GomegaMatcher + func HaveReadyReplicas(readyReplicas int) matcher.GomegaMatcher + func HaveReplicas(replicas int) matcher.GomegaMatcher + func HaveResourceRequirements(requirements *corev1.ResourceRequirements) matcher.GomegaMatcher + func HaveServiceAccountName(expectedServiceAccountName string) matcher.GomegaMatcher + func HaveSpecTemplateSpecVolume(volumeParam corev1.Volume) matcher.GomegaMatcher + func HaveTemplateAnnotationWithValue(key string, value string) matcher.GomegaMatcher + func HaveTemplateLabelWithValue(key string, value string) matcher.GomegaMatcher + func HaveTemplateSpec(podTemplateSpec corev1.PodTemplateSpec) matcher.GomegaMatcher + func HaveTemplateSpecNodeSelector(nodeSelector map[string]string) matcher.GomegaMatcher + func HaveTolerations(tolerations []corev1.Toleration) matcher.GomegaMatcher + func HaveUpdatedReplicas(updatedReplicas int) matcher.GomegaMatcher + func RemoveEnv(depl *appsv1.Deployment, container string, key string) + func SetEnv(depl *appsv1.Deployment, container string, key string, value string) + func Update(obj *appsv1.Deployment, modify func(*appsv1.Deployment)) + func VerifyDeploymentImagePullPolicy(name, namespace string, expectedPolicy corev1.PullPolicy) func() bool v1.17.0-rc5 Aug 6, 2025 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator v1.17.0-rc4 Jul 31, 2025 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator v1.17.0-rc3 Jul 30, 2025 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator v1.17.0-rc2 Jul 30, 2025 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator v1.17.0-rc1 Jul 24, 2025 GO-2025-3427 +1 more GO-2025-3427: Malicious PrometheusRule creation to all namespaces that deploy a ArgoCD CR instance in github.com/redhat-developer/gitops-operator GO-2025-4242: OpenShift GitOps authenticated attackers can obtain cluster root access through forged ArgoCD custom resources in github.com/redhat-developer/gitops-operator