pod: gh-test-custom-branch-djkrtr-on-pull-request-77zrb-init-pod | init container: prepare 2026/04/17 12:06:36 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-pull-request-77zrb-init-pod | container step-init: time="2026-04-17T12:06:40Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-04-17T12:06:40Z" level=info msg="[param] enable: false" time="2026-04-17T12:06:40Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-04-17T12:06:40Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-04-17T12:06:40Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-04-17T12:06:40Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-04-17T12:06:40Z" level=info msg="Cache proxy is disabled in param or in backend" time="2026-04-17T12:06:40Z" level=info msg="[result] HTTP PROXY: " time="2026-04-17T12:06:40Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-djkrtr-on-pull-request-bkg76-init-pod | init container: prepare 2026/04/17 12:10:59 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-pull-request-bkg76-init-pod | container step-init: time="2026-04-17T12:11:02Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-04-17T12:11:02Z" level=info msg="[param] enable: false" time="2026-04-17T12:11:02Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-04-17T12:11:02Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-04-17T12:11:02Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-04-17T12:11:02Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-04-17T12:11:02Z" level=info msg="Cache proxy is disabled in param or in backend" time="2026-04-17T12:11:02Z" level=info msg="[result] HTTP PROXY: " time="2026-04-17T12:11:02Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-apply-tags-pod | init container: prepare 2026/04/17 12:24:04 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-apply-tags-pod | container step-apply-additional-tags: time="2026-04-17T12:24:19Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807" time="2026-04-17T12:24:19Z" level=info msg="[param] digest: sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e" time="2026-04-17T12:24:19Z" level=info msg="[param] tags-from-image-label: konflux.additional-tags" time="2026-04-17T12:24:21Z" level=info msg="Additional tags from 'konflux.additional-tags' image label: test-tag1, test-tag2" {"tags":["test-tag1","test-tag2"]} pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | init container: prepare 2026/04/17 12:15:18 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | init container: place-scripts 2026/04/17 12:15:19 Decoded script /tekton/scripts/script-1-mshcn 2026/04/17 12:15:19 Decoded script /tekton/scripts/script-2-xj6x6 2026/04/17 12:15:19 Decoded script /tekton/scripts/script-3-fks2x 2026/04/17 12:15:19 Decoded script /tekton/scripts/script-4-sb2qn 2026/04/17 12:15:19 Decoded script /tekton/scripts/script-5-ggsmx pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Executing: oras blob fetch --registry-config /tmp/use-oci.sh.s7AVBZ/auth-K91O0L.json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-build: [2026-04-17T12:15:29,893612020+00:00] Validate context path [2026-04-17T12:15:29,896938090+00:00] Update CA trust [2026-04-17T12:15:29,897912776+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-04-17T12:15:36,422487678+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-04-17T12:15:36,428744665+00:00] Prepare system (architecture: x86_64) [2026-04-17T12:15:36,448409341+00:00] Setup prefetched Trying to pull quay.io/jitesoft/nginx:latest... Getting image source signatures Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying blob sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153 Copying blob sha256:3478266b4865f4efc58d163e64670ca678ab1de9918b00b890093f6426681f7b Copying blob sha256:c27fcb7ccfae0ffc78703910ca9ddd5a68dd0508825e673a3b9d06dd618ac0f3 Copying config sha256:e8566ed9bc606131964784db37d8103e708ee079caa4ef2be258acfe5e2b5033 Writing manifest to image destination [2026-04-17T12:15:42,195823947+00:00] Unsetting proxy { "com.jitesoft.app.alpine.version": "3.23.3", "com.jitesoft.app.nginx.version": "1.29.8", "com.jitesoft.build.arch": "amd64", "com.jitesoft.build.platform": "linux/amd64", "com.jitesoft.project.registry.uri": "registry.gitlab.com/jitesoft/dockerfiles/nginx", "com.jitesoft.project.repo.issues": "https://gitlab.com/jitesoft/dockerfiles/nginx/issues", "com.jitesoft.project.repo.type": "git", "com.jitesoft.project.repo.uri": "https://gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.alternative-locations": "oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.logo-url": "https://jitesoft.com/favicon-96x96.png", "io.artifacthub.package.readme-url": "https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md", "maintainer": "Johannes Tegnér ", "maintainer.org": "Jitesoft", "maintainer.org.uri": "https://jitesoft.com", "org.opencontainers.image.created": "2026-04-17T12:15:36Z", "org.opencontainers.image.description": "Nginx on Alpine linux", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-xalysy", "org.opencontainers.image.vendor": "Jitesoft", "org.opencontainers.image.version": "1.29.8", "architecture": "x86_64", "vcs-type": "git", "vcs-ref": "b5ae1ef1c42e48276c3ccc7fa360a225f4f40807", "org.opencontainers.image.revision": "b5ae1ef1c42e48276c3ccc7fa360a225f4f40807", "build-date": "2026-04-17T12:15:36Z", "io.buildah.version": "1.42.2", "konflux.additional-tags": "test-tag1, test-tag2" } [2026-04-17T12:15:42,229090254+00:00] Register sub-man Adding the entitlement to the build [2026-04-17T12:15:42,231176177+00:00] Add secrets [2026-04-17T12:15:42,533373263+00:00] Run buildah build [2026-04-17T12:15:42,534578071+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 --label org.opencontainers.image.revision=b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-xalysy --label build-date=2026-04-17T12:15:36Z --label org.opencontainers.image.created=2026-04-17T12:15:36Z --annotation org.opencontainers.image.revision=b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-xalysy --annotation org.opencontainers.image.created=2026-04-17T12:15:36Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.vAMq3I -t quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 . STEP 1/6: FROM quay.io/jitesoft/nginx:latest STEP 2/6: ENV PORT="8080" STEP 3/6: LABEL konflux.additional-tags="test-tag1, test-tag2" STEP 4/6: COPY labels.json /usr/share/buildinfo/labels.json STEP 5/6: COPY labels.json /root/buildinfo/labels.json STEP 6/6: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="b5ae1ef1c42e48276c3ccc7fa360a225f4f40807" "org.opencontainers.image.revision"="b5ae1ef1c42e48276c3ccc7fa360a225f4f40807" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-xalysy" "build-date"="2026-04-17T12:15:36Z" "org.opencontainers.image.created"="2026-04-17T12:15:36Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 time="2026-04-17T12:15:44Z" level=warning msg="HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format" --> 20097da09ec6 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 20097da09ec6cd1f83d6ecdfca57cc2452b7ec63b160e8baa80d3664383d1d87 [2026-04-17T12:15:48,399188025+00:00] Unsetting proxy [2026-04-17T12:15:48,400471583+00:00] Add metadata Recording base image digests used quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289 Getting image source signatures Copying blob sha256:bcb85a55f208c2e80c85f3b2bd0a401d9b49189e9f0585190b606dd16f27e22d Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying config sha256:20097da09ec6cd1f83d6ecdfca57cc2452b7ec63b160e8baa80d3664383d1d87 Writing manifest to image destination [2026-04-17T12:15:51,803546824+00:00] End build pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-push: [2026-04-17T12:15:52,174115956+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-04-17T12:15:56,068222166+00:00] Convert image [2026-04-17T12:15:56,069029521+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 docker://quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container Getting image source signatures Copying blob sha256:bcb85a55f208c2e80c85f3b2bd0a401d9b49189e9f0585190b606dd16f27e22d Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:20097da09ec6cd1f83d6ecdfca57cc2452b7ec63b160e8baa80d3664383d1d87 Writing manifest to image destination [2026-04-17T12:16:07,881808137+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 docker://quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 Getting image source signatures Copying blob sha256:bcb85a55f208c2e80c85f3b2bd0a401d9b49189e9f0585190b606dd16f27e22d Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying config sha256:20097da09ec6cd1f83d6ecdfca57cc2452b7ec63b160e8baa80d3664383d1d87 Writing manifest to image destination sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2equay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-04-17T12:16:09,363107453+00:00] End push pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-sbom-syft-generate: [2026-04-17T12:16:09,655094839+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-04-17T12:16:11,839402844+00:00] End sbom-syft-generate pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-prepare-sboms: [2026-04-17T12:16:12,659103737+00:00] Prepare SBOM [2026-04-17T12:16:12,662736199+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-04-17 12:16:40,262 [INFO] mobster.log: Logging level set to 20 2026-04-17 12:16:40,564 [INFO] mobster.oci: Fetching manifest for quay.io/jitesoft/nginx@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289 2026-04-17 12:16:42,571 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:43,351 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:44,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:45,644 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:47,179 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:47,873 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:49,463 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:50,176 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-04-17 12:16:50,176 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-04-17 12:16:50,176 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-04-17 12:16:50,177 [INFO] mobster.log: Contextual workflow completed in 9.62s 2026-04-17 12:16:50,183 [INFO] mobster.main: Exiting with code 0. [2026-04-17T12:16:50,769388264+00:00] End prepare-sboms pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-build-container-pod | container step-upload-sbom: [2026-04-17T12:16:51,818717734+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e] to [quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:sha256-e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:61431e16f824887a165bc3e5897bcbf9d35e80cc61da13d51bfa3e942d3cbbb6 [2026-04-17T12:17:17,230639338+00:00] End upload-sbom pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clamav-scan-pod | init container: prepare 2026/04/17 12:24:04 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clamav-scan-pod | init container: place-scripts 2026/04/17 12:24:16 Decoded script /tekton/scripts/script-0-jdjlm 2026/04/17 12:24:16 Decoded script /tekton/scripts/script-1-5lgxb pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clamav-scan-pod | container step-extract-and-scan-image: Starting clamd ... clamd is ready! Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e. Detected container image. Processing image manifests. Running "oc image extract" on image of arch amd64 Scanning image for arch amd64. This operation may take a while. ----------- SCAN SUMMARY ----------- Infected files: 0 Time: 1.451 sec (0 m 1 s) Start Date: 2026:04:17 12:24:39 End Date: 2026:04:17 12:24:40 Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27973/Thu Apr 16 06:24:10 2026 Database version: 27973 [ { "filename": "/work/logs/clamscan-result-log-amd64.json", "namespace": "required_checks", "successes": 2 } ] {"timestamp":"1776428680","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1776428680","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1776428680","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807", "digests": ["sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e"]}} pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clamav-scan-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Attaching to quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json Preparing clamscan-result-amd64.log Preparing clamscan-ec-test-amd64.json Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading 26539b084de0 clamscan-ec-test-amd64.json Uploading 27140115ad23 clamscan-result-amd64.log Uploaded 27140115ad23 clamscan-result-amd64.log Uploaded 26539b084de0 clamscan-ec-test-amd64.json Uploading 8735e8fd2f45 application/vnd.oci.image.manifest.v1+json Uploaded 8735e8fd2f45 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e Digest: sha256:8735e8fd2f45d0fc214adee6789ed838b49a02426c8186368b8196eb06a46a8a pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clone-repository-pod | init container: prepare 2026/04/17 12:14:29 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clone-repository-pod | init container: place-scripts 2026/04/17 12:14:30 Decoded script /tekton/scripts/script-0-p7nbs 2026/04/17 12:14:30 Decoded script /tekton/scripts/script-1-zpkxm pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1776428073.7255092,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1776428074.0831318,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-xalysy @ b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1776428074.0831823,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1776428074.102041,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 directly. pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clone-repository-pod | container step-symlink-check: Running symlink check pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d) Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Executing: oras push --registry-config /tmp/create-oci.sh.caJzL0/auth-F2R1PQ.json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807.git SOURCE_ARTIFACT Uploading a28bc5ca5ae9 SOURCE_ARTIFACT Uploaded a28bc5ca5ae9 SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:cf3a30d0fbb6894cff9eae6971b274d0211f97605592f685121519d9047a89ba Artifacts created pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-init-pod | init container: prepare 2026/04/17 12:14:17 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-init-pod | container step-init: time="2026-04-17T12:14:19Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-04-17T12:14:19Z" level=info msg="[param] enable: false" time="2026-04-17T12:14:19Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-04-17T12:14:19Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-04-17T12:14:19Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-04-17T12:14:19Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-04-17T12:14:19Z" level=info msg="Cache proxy is disabled in param or in backend" time="2026-04-17T12:14:19Z" level=info msg="[result] HTTP PROXY: " time="2026-04-17T12:14:19Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-push-dockerfile-pod | init container: prepare 2026/04/17 12:24:04 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-push-dockerfile-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Executing: oras blob fetch --registry-config /tmp/use-oci.sh.oS4DVX/auth-Jc5Hgw.json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d to /var/workdir/source pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-push-dockerfile-pod | container step-push: time="2026-04-17T12:24:24Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807" time="2026-04-17T12:24:24Z" level=info msg="[param] image-digest: sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e" time="2026-04-17T12:24:24Z" level=info msg="[param] containerfile: docker/Dockerfile" time="2026-04-17T12:24:24Z" level=info msg="[param] context: ." time="2026-04-17T12:24:24Z" level=info msg="[param] tag-suffix: .dockerfile" time="2026-04-17T12:24:24Z" level=info msg="[param] artifact-type: application/vnd.konflux.dockerfile" time="2026-04-17T12:24:24Z" level=info msg="[param] source: source" time="2026-04-17T12:24:24Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-04-17T12:24:24Z" level=info msg="[param] alternative-filename: Dockerfile" time="2026-04-17T12:24:25Z" level=info msg="oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:beeeae85e637fab0c0a68bcf1c07a21c5cf33d19e59ffc1fb7ccc3e37394b44a" logger=CliExecutor time="2026-04-17T12:24:25Z" level=info msg="Containerfile '/var/workdir/source/docker/Dockerfile' is pushed to registry with tag: sha256-e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e.dockerfile" {"image_ref":"quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:beeeae85e637fab0c0a68bcf1c07a21c5cf33d19e59ffc1fb7ccc3e37394b44a"} pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-shell-check-pod | init container: prepare 2026/04/17 12:24:04 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-shell-check-pod | init container: place-scripts 2026/04/17 12:24:17 Decoded script /tekton/scripts/script-1-4p2z2 2026/04/17 12:24:17 Decoded script /tekton/scripts/script-2-tx9tj pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-shell-check-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Executing: oras blob fetch --registry-config /tmp/use-oci.sh.btt3Gt/auth-KQ7xiC.json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-shell-check-pod | container step-sast-shell-check: + source /utils.sh ++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache ++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index + trap 'handle_error /tekton/results/TEST_OUTPUT' EXIT + [[ -z '' ]] + PROJECT_NAME=gh-test-custom-branch-djkrtr + echo 'INFO: The PROJECT_NAME used is: gh-test-custom-branch-djkrtr' + ca_bundle=/mnt/trusted-ca/ca-bundle.crt + '[' -f /mnt/trusted-ca/ca-bundle.crt ']' INFO: The PROJECT_NAME used is: gh-test-custom-branch-djkrtr + echo 'INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt' + cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' + update-ca-trust ++ rpm -q --queryformat '%{NAME}-%{VERSION}-%{RELEASE}\n' ShellCheck + PACKAGE_VERSION=ShellCheck-0.10.0-3.el9 + OUTPUT_FILE=shellcheck-results.json + SOURCE_CODE_DIR=/var/workdir/source + declare -a ALL_TARGETS + IFS=, + read -ra TARGET_ARRAY + for d in "${TARGET_ARRAY[@]}" + potential_path=/var/workdir/source/. ++ realpath -m /var/workdir/source/. + resolved_path=/var/workdir/source + [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]] + ALL_TARGETS+=("$resolved_path") + '[' -z '' ']' + '[' -r /sys/fs/cgroup/cpu.max ']' + read -r quota period + '[' 800000 '!=' max ']' + '[' -n 100000 ']' + '[' 100000 -gt 0 ']' + export SC_JOBS=8 + SC_JOBS=8 + echo 'INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh' INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh + /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source Looking for shell scripts................ done + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample + CSGREP_OPTS=(--mode=json --strip-path-prefix="$SOURCE_CODE_DIR"/ --remove-duplicates --embed-context=3 --set-scan-prop="ShellCheck:${PACKAGE_VERSION}") + [[ true == \t\r\u\e ]] + CSGREP_EVENT_FILTER='\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|' + CSGREP_EVENT_FILTER+='2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|' + CSGREP_EVENT_FILTER+='2218|2224|2225|2242|2256|2258|2261)\]$' + CSGREP_OPTS+=(--event="$CSGREP_EVENT_FILTER") + csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 '--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$' ./shellcheck-results/empty.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-128.json ./shellcheck-results/sc-129.json ./shellcheck-results/sc-136.json ./shellcheck-results/sc-84.json ./shellcheck-results/sc-87.json ./shellcheck-results/sc-89.json ./shellcheck-results/sc-92.json ./shellcheck-results/sc-95.json ./shellcheck-results/sc-99.json + [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]] + KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git + PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives + KFP_DIR=known-false-positives + KFP_CLONED=0 + mkdir known-false-positives + [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]] + echo -n 'INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... ' + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives ++ head -1 curl: (6) Could not resolve host: gitlab.cee.redhat.com + [[ 0 -eq 0 ]] + echo 'WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered' + echo 'ShellCheck results have been saved to shellcheck-results.json' + csgrep --mode=evtstat shellcheck-results.json INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered ShellCheck results have been saved to shellcheck-results.json + csgrep --mode=sarif shellcheck-results.json + TEST_OUTPUT= + parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif + TEST_NAME=sast-shell-check-oci-ta + TEST_RESULT_FORMAT=sarif + TEST_RESULT_FILE=shellcheck-results.sarif + '[' -z sast-shell-check-oci-ta ']' + '[' -z sarif ']' + '[' -z shellcheck-results.sarif ']' + '[' '!' -f shellcheck-results.sarif ']' + '[' sarif = sarif ']' +++ jq -rce '(if (.runs[].results | length > 0) then "FAILURE" else "SUCCESS" end)' shellcheck-results.sarif +++ jq -rce '(.runs[].results | length)' shellcheck-results.sarif ++ make_result_json -r SUCCESS -f 0 ++ local RESULT= ++ local SUCCESSES=0 ++ local FAILURES=0 ++ local WARNINGS=0 ++ local 'NOTE=For details, check Tekton task log.' ++ local NAMESPACE=default ++ local OUTPUT ++ local OPTIND opt ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ RESULT=SUCCESS ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ FAILURES=0 ++ getopts :r:s:f:w:t:n: opt ++ shift 4 ++ '[' -z SUCCESS ']' ++ case "${RESULT}" in ++++ date -u --iso-8601=seconds +++ jq -rce --arg date 2026-04-17T12:24:34+00:00 --arg result SUCCESS --arg note 'For details, check Tekton task log.' --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input '{ result: $result, timestamp: $date, note: $note, namespace: $namespace, successes: $successes|tonumber, failures: $failures|tonumber, warnings: $warnings|tonumber }' ++ OUTPUT='{"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + TEST_OUTPUT='{"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ jq .failures + '[' 0 -gt 0 ']' + echo '{"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + tee /tekton/results/TEST_OUTPUT {"result":"SUCCESS","timestamp":"2026-04-17T12:24:34+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0} + handle_error /tekton/results/TEST_OUTPUT + exit_code=0 + '[' 0 -ne 0 ']' + exit 0 pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-shell-check-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Attaching to quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e shellcheck-results.sarif:application/sarif+json Preparing shellcheck-results.sarif Exists 44136fa355b3 application/vnd.oci.empty.v1+json Exists 3b606a9dd3a1 shellcheck-results.sarif Uploading 1af24969a3e7 application/vnd.oci.image.manifest.v1+json Uploaded 1af24969a3e7 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr:b5ae1ef1c42e48276c3ccc7fa360a225f4f40807@sha256:e64376e6013682515978432d243191328383842d1ccd88156ebb8e77e7697a2e Digest: sha256:1af24969a3e77910616d39a30760f432850ec94e640695fcbf91df3952c8f358 No excluded-findings.json exists. Skipping upload. pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-snyk-check-pod | init container: prepare 2026/04/17 12:24:04 Entrypoint initialization pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-snyk-check-pod | init container: place-scripts 2026/04/17 12:24:16 Decoded script /tekton/scripts/script-1-vpm9j 2026/04/17 12:24:16 Decoded script /tekton/scripts/script-2-5l56t pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-snyk-check-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr Executing: oras blob fetch --registry-config /tmp/use-oci.sh.fEsg9d/auth-kQtKFk.json quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-xwfz/gh-test-custom-branch-djkrtr@sha256:a28bc5ca5ae973fc062eff534b9612c4eeee0ef7cf8e33f2604bacc86967512d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-snyk-check-pod | container step-sast-snyk-check: INFO: The PROJECT_NAME used is: gh-test-custom-branch-djkrtr INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' {"result":"SKIPPED","timestamp":"2026-04-17T12:24:35+00:00","note":"Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key 'snyk_token' containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)","namespace":"default","successes":0,"failures":0,"warnings":0} pod: gh-test-custom-branch-djkrtr-on-push-2h5tf-sast-snyk-check-pod | container step-upload: No sast_snyk_check_out.sarif exists. Skipping upload. No excluded-findings.json exists. Skipping upload.