go: downloading github.com/konflux-ci/build-service v0.0.0-20240611083846-2dee6cfe6fe4 go: downloading github.com/devfile/library/v2 v2.2.1-0.20230418160146-e75481b7eebd go: downloading github.com/konflux-ci/e2e-tests v0.0.0-20260506085906-2e394d3dcf2e go: downloading k8s.io/api v0.34.2 go: downloading github.com/google/go-containerregistry v0.20.7 go: downloading github.com/google/go-github/v66 v66.0.0 go: downloading github.com/konflux-ci/application-api v0.0.0-20260312190025-5154ad273e17 go: downloading github.com/onsi/gomega v1.39.1 go: downloading k8s.io/apimachinery v0.34.2 go: downloading github.com/tektoncd/pipeline v1.7.0 go: downloading github.com/konflux-ci/release-service v0.0.0-20260127184035-c36c56a3c440 go: downloading github.com/go-logr/logr v1.4.3 go: downloading golang.org/x/sys v0.42.0 go: downloading github.com/openshift-pipelines/pipelines-as-code v0.34.0 go: downloading github.com/openshift/api v0.0.0-20260320151444-324a1bcb9f55 go: downloading golang.org/x/exp v0.0.0-20260312153236-7ab1446f8b90 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 go: downloading k8s.io/client-go v0.34.2 go: downloading knative.dev/pkg v0.0.0-20250424013628-d5e74d29daa3 go: downloading sigs.k8s.io/controller-runtime v0.20.2 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.17.0 go: downloading github.com/google/go-github/v45 v45.2.0 go: downloading github.com/prometheus/client_golang v1.23.2 go: downloading golang.org/x/oauth2 v0.34.0 go: downloading k8s.io/apiextensions-apiserver v0.34.2 go: downloading github.com/fatih/color v1.18.0 go: downloading github.com/go-git/go-git/v5 v5.16.5 go: downloading github.com/gobwas/glob v0.2.3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/pkg/errors v0.9.1 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/operator-framework/operator-lib v0.19.0 go: downloading github.com/konflux-ci/operator-toolkit v0.0.0-20260312101100-d4e398191a68 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/konflux-ci/image-controller v0.0.0-20240530145826-3296e4996f6f go: downloading github.com/openshift/library-go v0.0.0-20220525173854-9b950a41acdc go: downloading github.com/moby/buildkit v0.12.5 go: downloading github.com/xanzy/go-gitlab v0.114.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading github.com/avast/retry-go/v4 v4.3.3 go: downloading github.com/docker/cli v29.0.3+incompatible go: downloading github.com/magefile/mage v1.14.0 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.2 go: downloading github.com/google/go-github/v75 v75.0.0 go: downloading go.yaml.in/yaml/v2 v2.4.4 go: downloading github.com/google/go-querystring v1.2.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/spf13/afero v1.15.0 go: downloading github.com/mattn/go-colorable v0.1.14 go: downloading github.com/mattn/go-isatty v0.0.20 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.67.5 go: downloading github.com/prometheus/procfs v0.19.2 go: downloading google.golang.org/protobuf v1.36.11 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading golang.org/x/net v0.52.0 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.2 go: downloading github.com/gofri/go-github-ratelimit v1.0.3-0.20230428184158-a500e14de53f go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/opencontainers/image-spec v1.1.1 go: downloading oras.land/oras-go/v2 v2.5.0 go: downloading github.com/conforma/crds/api v0.1.7 go: downloading github.com/tektoncd/cli v0.43.0 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading codeberg.org/mvdkleijn/forgejo-sdk/forgejo/v2 v2.2.0 go: downloading github.com/codeready-toolchain/api v0.0.0-20231217224957-34f7cb3fcbf7 go: downloading github.com/konflux-ci/integration-service v0.0.0-20260330012634-6190adb9bbce go: downloading github.com/openshift/client-go v0.0.0-20260108185524-48f4ccfc4e13 go: downloading github.com/redhat-appstudio/jvm-build-service v0.0.0-20240126122210-0e2ee7e2e5b0 go: downloading github.com/vmware-tanzu/velero v1.17.2 go: downloading github.com/codeready-toolchain/toolchain-common v0.0.0-20220523142428-2558e76260fb go: downloading github.com/codeready-toolchain/toolchain-e2e v0.0.0-20220525131508-60876bfb99d3 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/bmatcuk/doublestar/v4 v4.7.1 go: downloading golang.org/x/crypto v0.49.0 go: downloading golang.org/x/text v0.35.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 go: downloading k8s.io/kube-openapi v0.0.0-20260330154417-16be699c7b31 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 go: downloading golang.org/x/time v0.15.0 go: downloading github.com/google/btree v1.1.3 go: downloading dario.cat/mergo v1.0.2 go: downloading github.com/ProtonMail/go-crypto v1.3.0 go: downloading github.com/go-git/go-billy/v5 v5.7.0 go: downloading github.com/sergi/go-diff v1.4.0 go: downloading github.com/containerd/stargz-snapshotter/estargz v0.18.1 go: downloading github.com/docker/distribution v2.8.3+incompatible go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/42wim/httpsig v1.2.3 go: downloading github.com/go-fed/httpsig v1.1.1-0.20201223112313-55836744818e go: downloading github.com/hashicorp/go-version v1.7.0 go: downloading github.com/google/cel-go v0.26.1 go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/santhosh-tekuri/jsonschema/v5 v5.3.1 go: downloading github.com/docker/docker v28.5.2+incompatible go: downloading github.com/spf13/pflag v1.0.10 go: downloading github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 go: downloading github.com/pjbgf/sha1cd v0.5.0 go: downloading github.com/emirpasic/gods v1.18.1 go: downloading github.com/cyphar/filepath-securejoin v0.6.1 go: downloading github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 go: downloading github.com/klauspost/compress v1.18.2 go: downloading github.com/vbatts/tar-split v0.12.2 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/containerd/typeurl/v2 v2.2.2 go: downloading github.com/docker/docker-credential-helpers v0.9.3 go: downloading golang.org/x/term v0.41.0 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/google/gnostic-models v0.7.1 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 go: downloading github.com/kevinburke/ssh_config v1.4.0 go: downloading github.com/skeema/knownhosts v1.3.2 go: downloading github.com/xanzy/ssh-agent v0.3.3 go: downloading github.com/cloudflare/circl v1.6.3 go: downloading contrib.go.opencensus.io/exporter/ocagent v0.7.1-0.20230502190836-7399e0f8ee5e go: downloading contrib.go.opencensus.io/exporter/prometheus v0.4.2 go: downloading go.opencensus.io v0.24.0 go: downloading go.uber.org/zap v1.27.1 go: downloading google.golang.org/grpc v1.79.3 go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/go-openapi/jsonreference v0.21.5 go: downloading github.com/go-openapi/swag v0.25.5 go: downloading github.com/emicklei/go-restful/v3 v3.13.0 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/blendle/zapdriver v1.3.1 go: downloading gopkg.in/evanphx/json-patch.v4 v4.13.0 go: downloading github.com/prometheus/statsd_exporter v0.28.0 go: downloading github.com/census-instrumentation/opencensus-proto v0.4.1 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/api v0.262.0 go: downloading github.com/go-openapi/jsonpointer v0.22.5 go: downloading github.com/go-openapi/swag/cmdutils v0.25.5 go: downloading github.com/go-openapi/swag/conv v0.25.5 go: downloading github.com/go-openapi/swag/fileutils v0.25.5 go: downloading github.com/go-openapi/swag/jsonname v0.25.5 go: downloading github.com/go-openapi/swag/jsonutils v0.25.5 go: downloading github.com/go-openapi/swag/loading v0.25.5 go: downloading github.com/go-openapi/swag/mangling v0.25.5 go: downloading github.com/go-openapi/swag/netutils v0.25.5 go: downloading github.com/go-openapi/swag/stringutils v0.25.5 go: downloading github.com/go-openapi/swag/yamlutils v0.25.5 go: downloading github.com/go-openapi/swag/typeutils v0.25.5 go: downloading go.uber.org/multierr v1.11.0 go: downloading cel.dev/expr v0.25.1 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260406210006-6f92a3bedf2d go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.6 go: downloading github.com/stoewer/go-strcase v1.3.1 go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 go: downloading github.com/klauspost/cpuid/v2 v2.3.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260401024825-9d38bb4040a9 Running Suite: Build Service E2E - /workspace/source/e2e-tests/tests ==================================================================== Random Seed: 1778845572 Will run 66 of 157 specs Running in parallel across 5 processes SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ • [22.332 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:106 Timeline >> Image repository for component go-component-kfcksl in namespace build-e2e-lwpm do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component go-component-kfcksl in namespace build-e2e-lwpm do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [23.159 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:123 Timeline >> Image repository for component component-one-xijl in namespace build-e2e-vmlz do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component component-one-xijl in namespace build-e2e-vmlz do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [10.146 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:140 Timeline >> Image repository for component component-two-qigt in namespace build-e2e-vmlz do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [38.786 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named 'main') with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:137 Timeline >> Image repository for component gh-test-custom-default-mvwwfz in namespace build-e2e-cpyj do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component gh-test-custom-default-mvwwfz in namespace build-e2e-cpyj do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [0.127 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:154 ------------------------------ • [39.108 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:235 Timeline >> ReleaseAdmissionPlan data: {"Mapping":{"Components":[{"Name":"gh-multi-component-parent-pkff","Repository":"quay.io/redhat-appstudio-qe/release-repository"}]}}Image repository for component gh-multi-component-child-pkff in namespace build-e2e-evhu do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component gh-multi-component-child-pkff in namespace build-e2e-evhu do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component gh-multi-component-parent-pkff in namespace build-e2e-evhu do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [20.184 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-kfcksl [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:125 Timeline >> PipelineRun has not been created yet for the component build-e2e-lwpm/go-component-kfcksl << Timeline ------------------------------ • [0.361 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-kfcksl [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:140 ------------------------------ • [10.216 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:158 Timeline >> build status annotation value: {"message":"waiting for spec.containerImage to be set by ImageRepository with annotation image-controller.appstudio.redhat.com/update-component-image"} build status annotation value: {"message":"waiting for spec.containerImage to be set by ImageRepository with annotation image-controller.appstudio.redhat.com/update-component-image"} build status annotation value: {"pac":{"state":"error","error-id":74,"error-message":"74: Access token is unrecognizable by GitHub"},"message":"done"} << Timeline ------------------------------ • [20.383 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:176 Timeline >> PipelineRun has not been created yet for the component build-e2e-cpyj/gh-test-custom-branch-psluto << Timeline ------------------------------ • [0.000 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:191 ------------------------------ • [0.376 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:195 Timeline >> build status annotation value: {"pac":{"state":"enabled","merge-url":"https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp/pull/1","configuration-time":"Fri, 15 May 2026 11:50:49 UTC"},"message":"done"} state: enabled mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp/pull/1 errId: 0 errMessage: configurationTime: Fri, 15 May 2026 11:50:49 UTC << Timeline ------------------------------ • [1.325 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:225 ------------------------------ • [0.281 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:243 ------------------------------ • [72.191 seconds] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations] /workspace/source/e2e-tests/tests/annotations.go:89 Timeline >> Image repository for component test-annotations-knqaxu in namespace build-e2e-ecai do not have right state ('' != 'ready') yet but it has status { { } { } []}. build status annotation value: {"message":"unexpected build request: foo"} << Timeline ------------------------------ • [15.271 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:249 ------------------------------ • [0.203 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:264 ------------------------------ • [0.963 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:277 ------------------------------ • [41.859 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:259 Timeline >> PipelineRun has not been created yet for the component build-e2e-evhu/gh-multi-component-parent-pkff PipelineRun has not been created yet for the component build-e2e-evhu/gh-multi-component-parent-pkff << Timeline ------------------------------ • [34.529 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:327 Timeline >> Image repository for component gh-test-custom-branch-psluto in namespace build-e2e-cpyj do not have right state ('' != 'ready') yet but it has status { { } { } []}. PipelineRun has not been created yet for the component build-e2e-cpyj/gh-test-custom-branch-psluto << Timeline ------------------------------ • [0.225 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:342 ------------------------------ • [FAILED] [302.477 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created [It] triggered PipelineRun is for component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:178 Timeline >> PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt PipelineRun has not been created yet for the component build-e2e-vmlz/component-two-qigt [FAILED] in [It] - /workspace/source/e2e-tests/tests/secret_lookup.go:190 @ 05/15/26 11:55:55.276 << Timeline [FAILED] Timed out after 300.001s. timed out when waiting for the PipelineRun to start for the component component-two-qigt/build-e2e-vmlz Expected success, but got an error: <*errors.errorString | 0xc000d8e7c0>: no pipelinerun found for component component-two-qigt { s: "no pipelinerun found for component component-two-qigt", } In [It] at: /workspace/source/e2e-tests/tests/secret_lookup.go:190 @ 05/15/26 11:55:55.276 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created [It] check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:193 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/secret_lookup.go:193 @ 05/15/26 11:55:57.752 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:206 ------------------------------ • [300.191 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:360 Timeline >> PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm found for Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-7sxhm reason: Completed << Timeline ------------------------------ • [0.969 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:365 ------------------------------ • [0.268 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:384 ------------------------------ • [0.601 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:390 Timeline >> Image tag quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:on-pr-824dd544068bb8a98325fe31b3cc436ca47223a1 successfully found in Quay << Timeline ------------------------------ • [0.983 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:416 ------------------------------ • [0.516 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:433 ------------------------------ • [353.491 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:274 Timeline >> PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 found for Component build-e2e-evhu/gh-multi-component-parent-pkff PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-qrbk7 reason: Failed attempt 1/3: PipelineRun "gh-multi-component-parent-pkff-on-pull-request-qrbk7" failed: pod: gh-multi-component-parent-pkff-on-pull-request-qrbk7-init-pod | init container: prepare 2026/05/15 11:51:51 Entrypoint initialization pod: gh-multi-component-parent-pkff-on-pull-request-qrbk7-init-pod | container step-init: time="2026-05-15T11:51:56Z" level=info msg="[param] enable: false" time="2026-05-15T11:51:56Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T11:51:56Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T11:51:56Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T11:51:56Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T11:51:56Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T11:51:56Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T11:51:56Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T11:51:56Z" level=info msg="[result] NO PROXY: " New PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 found after retrigger for component build-e2e-evhu/gh-multi-component-parent-pkff PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 found for Component build-e2e-evhu/gh-multi-component-parent-pkff PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Running PipelineRun gh-multi-component-parent-pkff-on-pull-request-rf864 reason: Completed << Timeline ------------------------------ • [0.064 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:285 Timeline >> PipelineRun gh-multi-component-child-pkff-on-pull-request-9xk47 found for Component build-e2e-evhu/gh-multi-component-child-pkff PipelineRun gh-multi-component-child-pkff-on-pull-request-9xk47 reason: Completed << Timeline ------------------------------ • [0.212 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:289 ------------------------------ • [1.996 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:307 Timeline >> merged result sha: ec28b123318705a843015ee6738a6e36ef731cc9 for PR #1 << Timeline ------------------------------ • [20.840 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:458 Timeline >> created file sha: df6ec4bbc26341d0b29273c7f3227cbc4d9f24b9 PipelineRun has not been created yet for the component build-e2e-cpyj/gh-test-custom-branch-psluto << Timeline ------------------------------ • [0.169 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:473 ------------------------------ • [6.340 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:318 ------------------------------ • [0.194 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:358 ------------------------------ • [1.717 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:375 Timeline >> merged result sha: 27e8ebecf75f11290393b7dabb167873c01405cc for PR #1 << Timeline ------------------------------ • [24.139 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:385 Timeline >> Push PipelineRun has not been created yet for the component build-e2e-evhu/gh-multi-component-parent-pkff << Timeline ------------------------------ • [452.316 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-kfcksl [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:159 Timeline >> PipelineRun go-component-kfcksl-on-pull-request-9f6dj found for Component build-e2e-lwpm/go-component-kfcksl PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: ResolvingTaskRef PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Running PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Running PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Running PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Running PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Running PipelineRun go-component-kfcksl-on-pull-request-9f6dj reason: Failed attempt 1/3: PipelineRun "go-component-kfcksl-on-pull-request-9f6dj" failed: pod: go-component-kfcksl-on-pull-request-9f6dj-clone-repository-pod | init container: prepare 2026/05/15 11:51:41 Entrypoint initialization pod: go-component-kfcksl-on-pull-request-9f6dj-clone-repository-pod | init container: place-scripts 2026/05/15 11:51:45 Decoded script /tekton/scripts/script-0-mh7sn 2026/05/15 11:51:45 Decoded script /tekton/scripts/script-1-7b9h4 pod: go-component-kfcksl-on-pull-request-9f6dj-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778845935.515129,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778845936.3490012,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 7f431ac1025975a2b0f67ea643016a97d529bfc9 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778845936.3490376,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778845936.3727098,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision 7f431ac1025975a2b0f67ea643016a97d529bfc9 directly. pod: go-component-kfcksl-on-pull-request-9f6dj-clone-repository-pod | container step-symlink-check: Running symlink check pod: go-component-kfcksl-on-pull-request-9f6dj-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:56c238c4a14d7951f4e7c5daec67d5ef8257ab74424415c9928a114a6f595b01) Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/go-component-kfcksl Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.bbBQZa/auth-kRC9k2.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/go-component-kfcksl:on-pr-7f431ac1025975a2b0f67ea643016a97d529bfc9.git SOURCE_ARTIFACT Uploading 56c238c4a14d SOURCE_ARTIFACT Uploaded 56c238c4a14d SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-lwpm/go-component-kfcksl:on-pr-7f431ac1025975a2b0f67ea643016a97d529bfc9.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:a7386555694144b6819115ee158ef291ecbf3c44a318a0aa7d1649a653e1cafd Artifacts created pod: go-component-kfcksl-on-pull-request-9f6dj-init-pod | init container: prepare 2026/05/15 11:51:15 Entrypoint initialization pod: go-component-kfcksl-on-pull-request-9f6dj-init-pod | container step-init: time="2026-05-15T11:51:28Z" level=info msg="[param] enable: false" time="2026-05-15T11:51:28Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T11:51:28Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T11:51:28Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T11:51:28Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T11:51:28Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T11:51:28Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T11:51:28Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T11:51:28Z" level=info msg="[result] NO PROXY: " New PipelineRun go-component-kfcksl-on-pull-request-h7vjt found after retrigger for component build-e2e-lwpm/go-component-kfcksl PipelineRun go-component-kfcksl-on-pull-request-h7vjt found for Component build-e2e-lwpm/go-component-kfcksl PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: ResolvingTaskRef PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Running PipelineRun go-component-kfcksl-on-pull-request-h7vjt reason: Completed << Timeline ------------------------------ • [1.780 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:164 Timeline >> merged result sha: 6cdf468df17aee010da967440322aadae37c7165 for PR #33410 << Timeline ------------------------------ • [20.189 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:174 Timeline >> Push PipelineRun has not been created yet for the component build-e2e-lwpm/go-component-kfcksl << Timeline ------------------------------ • [10.147 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:106 Timeline >> Image repository for component python-component-gvccyx in namespace build-e2e-lwpm do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [20.229 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-gvccyx [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:125 Timeline >> PipelineRun has not been created yet for the component build-e2e-lwpm/python-component-gvccyx << Timeline ------------------------------ • [0.424 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-gvccyx [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:140 ------------------------------ • [180.195 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:492 Timeline >> PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 found for Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Running PipelineRun gh-test-custom-branch-psluto-on-pull-request-fqcc9 reason: Completed << Timeline ------------------------------ • [0.547 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:497 ------------------------------ • [22.545 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:523 Timeline >> merged result sha: f2d5e8c7e4ccf2bd5286a469679f87058e307de0 PipelineRun has not been created yet for the component build-e2e-cpyj/gh-test-custom-branch-psluto << Timeline ------------------------------ • [260.386 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component is successful [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:401 Timeline >> PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq found for Component build-e2e-evhu/gh-multi-component-parent-pkff PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Running PipelineRun gh-multi-component-parent-pkff-on-push-mkrsq reason: Completed << Timeline ------------------------------ • [619.024 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:539 Timeline >> PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 found for Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun has not been created yet for the Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun has not been created yet for the Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-nsfs8 reason: Failed attempt 1/3: PipelineRun "gh-test-custom-branch-psluto-on-push-nsfs8" failed: pod: gh-test-custom-branch-psluto-on-pull-request-7sxhm-init-pod | init container: prepare 2026/05/15 11:52:12 Entrypoint initialization pod: gh-test-custom-branch-psluto-on-pull-request-7sxhm-init-pod | container step-init: time="2026-05-15T11:52:44Z" level=info msg="[param] enable: false" time="2026-05-15T11:52:44Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T11:52:44Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T11:52:44Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T11:52:44Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T11:52:44Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T11:52:44Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T11:52:44Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T11:52:44Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-psluto-on-pull-request-fqcc9-init-pod | init container: prepare 2026/05/15 11:57:27 Entrypoint initialization pod: gh-test-custom-branch-psluto-on-pull-request-fqcc9-init-pod | container step-init: time="2026-05-15T11:57:45Z" level=info msg="[param] enable: false" time="2026-05-15T11:57:45Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T11:57:45Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T11:57:45Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T11:57:45Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T11:57:45Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T11:57:45Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T11:57:45Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T11:57:45Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | init container: prepare 2026/05/15 12:02:21 Entrypoint initialization pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | init container: place-scripts 2026/05/15 12:02:27 Decoded script /tekton/scripts/script-1-t64dn 2026/05/15 12:02:27 Decoded script /tekton/scripts/script-2-2rmpn 2026/05/15 12:02:27 Decoded script /tekton/scripts/script-3-qt7q5 2026/05/15 12:02:27 Decoded script /tekton/scripts/script-4-sbg6j 2026/05/15 12:02:27 Decoded script /tekton/scripts/script-5-2z9jm pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto Executing: oras blob fetch --registry-config /tmp/use-oci.sh.kbS31a/auth-kt1FTF.json quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto@sha256:e69d3081dd9172b4a159e7c900fb58cdcc77eaa1819bd79cd0395cbffc9ffa00 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto@sha256:e69d3081dd9172b4a159e7c900fb58cdcc77eaa1819bd79cd0395cbffc9ffa00 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-build: [2026-05-15T12:02:40,663732521+00:00] Validate context path [2026-05-15T12:02:40,666886267+00:00] Update CA trust [2026-05-15T12:02:40,667899984+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-15T12:02:43,263142027+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-15T12:02:43,270494705+00:00] Prepare system (architecture: x86_64) [2026-05-15T12:02:43,286716302+00:00] Setup prefetched Trying to pull quay.io/jitesoft/nginx:latest... Getting image source signatures Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying blob sha256:6a0ac1617861a677b045b7ff88545213ec31c0ff08763195a70a4a5adda577bb Copying blob sha256:38ee21f7253cce56c9405334d504677e72dcd55e39751923a4736661e951eba5 Copying blob sha256:09ac80f24300ac7afc0a739ebccb6f15cccc7bdaf99d7a8a9d279ad8f1e09924 Copying config sha256:6fda0e0fe84e9ab390d4a493cb931b25dff61d287088af60f7cf40c38e5997a9 Writing manifest to image destination [2026-05-15T12:02:47,395970916+00:00] Unsetting proxy { "com.jitesoft.app.alpine.version": "3.23.4", "com.jitesoft.app.nginx.version": "1.31.0", "com.jitesoft.build.arch": "amd64", "com.jitesoft.build.platform": "linux/amd64", "com.jitesoft.project.registry.uri": "registry.gitlab.com/jitesoft/dockerfiles/nginx", "com.jitesoft.project.repo.issues": "https://gitlab.com/jitesoft/dockerfiles/nginx/issues", "com.jitesoft.project.repo.type": "git", "com.jitesoft.project.repo.uri": "https://gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.alternative-locations": "oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.logo-url": "https://jitesoft.com/favicon-96x96.png", "io.artifacthub.package.readme-url": "https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md", "maintainer": "Johannes Tegnér ", "maintainer.org": "Jitesoft", "maintainer.org.uri": "https://jitesoft.com", "org.opencontainers.image.created": "2026-05-15T12:02:43Z", "org.opencontainers.image.description": "Nginx on Alpine linux", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp", "org.opencontainers.image.vendor": "Jitesoft", "org.opencontainers.image.version": "1.31.0", "architecture": "x86_64", "vcs-type": "git", "vcs-ref": "f2d5e8c7e4ccf2bd5286a469679f87058e307de0", "org.opencontainers.image.revision": "f2d5e8c7e4ccf2bd5286a469679f87058e307de0", "build-date": "2026-05-15T12:02:43Z", "io.buildah.version": "1.42.2", "konflux.additional-tags": "test-tag1, test-tag2" } [2026-05-15T12:02:47,437074442+00:00] Register sub-man Adding the entitlement to the build [2026-05-15T12:02:47,440112688+00:00] Add secrets [2026-05-15T12:02:47,807801979+00:00] Run buildah build [2026-05-15T12:02:47,808987929+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=f2d5e8c7e4ccf2bd5286a469679f87058e307de0 --label org.opencontainers.image.revision=f2d5e8c7e4ccf2bd5286a469679f87058e307de0 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp --label build-date=2026-05-15T12:02:43Z --label org.opencontainers.image.created=2026-05-15T12:02:43Z --annotation org.opencontainers.image.revision=f2d5e8c7e4ccf2bd5286a469679f87058e307de0 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp --annotation org.opencontainers.image.created=2026-05-15T12:02:43Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.HMNDuw -t quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 . STEP 1/6: FROM quay.io/jitesoft/nginx:latest STEP 2/6: ENV PORT="8080" STEP 3/6: LABEL konflux.additional-tags="test-tag1, test-tag2" STEP 4/6: COPY labels.json /usr/share/buildinfo/labels.json STEP 5/6: COPY labels.json /root/buildinfo/labels.json STEP 6/6: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="f2d5e8c7e4ccf2bd5286a469679f87058e307de0" "org.opencontainers.image.revision"="f2d5e8c7e4ccf2bd5286a469679f87058e307de0" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp" "build-date"="2026-05-15T12:02:43Z" "org.opencontainers.image.created"="2026-05-15T12:02:43Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 time="2026-05-15T12:02:53Z" level=warning msg="HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format" --> 285191f3b5eb Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 285191f3b5eb98c930909973e77d2ccd2264ecc0bb0e0b94fc359e1da33e9ae7 [2026-05-15T12:02:54,414775883+00:00] Unsetting proxy [2026-05-15T12:02:54,416063315+00:00] Add metadata Recording base image digests used quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:f931b4e7d6b1565d0f878b467a25a7c0f319fc81ff1983b96d042dca1d73df99 Getting image source signatures Copying blob sha256:6a7cf22e585f18222f0e2b5087da21f13f8ec6509342961ad79d36712afa16c6 Copying blob sha256:29df493baa13de438d6d2ece3a8333032e0b7b9b9d8cce4ee82194da255f61e1 Copying blob sha256:384a696a70402046eb873f1e75ae3694be35bc3079b1bc06a41eee8787e047c4 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:7349821ca320ec19744eab110f5556420854ce98e929624006de0fcb5fef9458 Copying config sha256:285191f3b5eb98c930909973e77d2ccd2264ecc0bb0e0b94fc359e1da33e9ae7 Writing manifest to image destination [2026-05-15T12:02:54,811183977+00:00] End build pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-push: [2026-05-15T12:02:55,809813035+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-15T12:03:01,507501328+00:00] Convert image [2026-05-15T12:03:01,508564664+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:gh-test-custom-branch-psluto-on-push-nsfs8-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 docker://quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:gh-test-custom-branch-psluto-on-push-nsfs8-build-container Getting image source signatures Copying blob sha256:6a7cf22e585f18222f0e2b5087da21f13f8ec6509342961ad79d36712afa16c6 Copying blob sha256:29df493baa13de438d6d2ece3a8333032e0b7b9b9d8cce4ee82194da255f61e1 Copying blob sha256:384a696a70402046eb873f1e75ae3694be35bc3079b1bc06a41eee8787e047c4 Copying blob sha256:7349821ca320ec19744eab110f5556420854ce98e929624006de0fcb5fef9458 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:285191f3b5eb98c930909973e77d2ccd2264ecc0bb0e0b94fc359e1da33e9ae7 Writing manifest to image destination [2026-05-15T12:03:31,277941272+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 docker://quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 Getting image source signatures Copying blob sha256:6a7cf22e585f18222f0e2b5087da21f13f8ec6509342961ad79d36712afa16c6 Copying blob sha256:29df493baa13de438d6d2ece3a8333032e0b7b9b9d8cce4ee82194da255f61e1 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:384a696a70402046eb873f1e75ae3694be35bc3079b1bc06a41eee8787e047c4 Copying blob sha256:7349821ca320ec19744eab110f5556420854ce98e929624006de0fcb5fef9458 Copying config sha256:285191f3b5eb98c930909973e77d2ccd2264ecc0bb0e0b94fc359e1da33e9ae7 Writing manifest to image destination sha256:3949e4dfcf2f9dab7ab31a8f94a269bd99b3c381cb1df14a16ecc68b1f1a9d1aquay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-15T12:03:33,293796355+00:00] End push pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-sbom-syft-generate: [2026-05-15T12:03:34,056563022+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-15T12:03:38,442226704+00:00] End sbom-syft-generate pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-prepare-sboms: [2026-05-15T12:03:38,897864518+00:00] Prepare SBOM [2026-05-15T12:03:38,901769171+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-15 12:03:57,307 [INFO] mobster.log: Logging level set to 20 2026-05-15 12:03:58,206 [INFO] mobster.oci: Fetching manifest for quay.io/jitesoft/nginx@sha256:f931b4e7d6b1565d0f878b467a25a7c0f319fc81ff1983b96d042dca1d73df99 2026-05-15 12:04:00,467 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:01,242 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:02,906 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:03,727 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:05,550 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:06,287 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:07,923 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:08,665 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:7693fbd912f3a3b7aaff55a224c5d9461da467c79feb930c7f74ad5d7c718576 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-15 12:04:08,665 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-05-15 12:04:08,665 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-15 12:04:08,665 [INFO] mobster.log: Contextual workflow completed in 10.55s 2026-05-15 12:04:08,673 [INFO] mobster.main: Exiting with code 0. [2026-05-15T12:04:09,508305528+00:00] End prepare-sboms pod: gh-test-custom-branch-psluto-on-push-nsfs8-build-container-pod | container step-upload-sbom: [2026-05-15T12:04:10,652370182+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0@sha256:3949e4dfcf2f9dab7ab31a8f94a269bd99b3c381cb1df14a16ecc68b1f1a9d1a WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto@sha256:3949e4dfcf2f9dab7ab31a8f94a269bd99b3c381cb1df14a16ecc68b1f1a9d1a] to [quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:sha256-3949e4dfcf2f9dab7ab31a8f94a269bd99b3c381cb1df14a16ecc68b1f1a9d1a.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto@sha256:2b44c11168ca3a084bd33e4ed89bd92571c671f77eba747ad20ef138f58ee652 [2026-05-15T12:05:42,534252073+00:00] End upload-sbom pod: gh-test-custom-branch-psluto-on-push-nsfs8-clone-repository-pod | init container: prepare 2026/05/15 12:01:56 Entrypoint initialization pod: gh-test-custom-branch-psluto-on-push-nsfs8-clone-repository-pod | init container: place-scripts 2026/05/15 12:01:59 Decoded script /tekton/scripts/script-0-9cc89 2026/05/15 12:01:59 Decoded script /tekton/scripts/script-1-f7lxq pod: gh-test-custom-branch-psluto-on-push-nsfs8-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778846522.4670758,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778846522.8530655,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-ahcjhp @ f2d5e8c7e4ccf2bd5286a469679f87058e307de0 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778846522.8531148,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778846522.8774405,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision f2d5e8c7e4ccf2bd5286a469679f87058e307de0 directly. pod: gh-test-custom-branch-psluto-on-push-nsfs8-clone-repository-pod | container step-symlink-check: Running symlink check pod: gh-test-custom-branch-psluto-on-push-nsfs8-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:e69d3081dd9172b4a159e7c900fb58cdcc77eaa1819bd79cd0395cbffc9ffa00) Using token for quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto Executing: oras push --registry-config /tmp/create-oci.sh.R2iaCv/auth-V1hv8O.json quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0.git SOURCE_ARTIFACT Uploading e69d3081dd91 SOURCE_ARTIFACT Uploaded e69d3081dd91 SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-cpyj/gh-test-custom-branch-psluto:f2d5e8c7e4ccf2bd5286a469679f87058e307de0.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:0463ddd4a819052a92316b931a7338183a0b663cf85a68f3e3c326fa09a4d48b Artifacts created pod: gh-test-custom-branch-psluto-on-push-nsfs8-init-pod | init container: prepare 2026/05/15 12:01:39 Entrypoint initialization pod: gh-test-custom-branch-psluto-on-push-nsfs8-init-pod | container step-init: time="2026-05-15T12:01:45Z" level=info msg="[param] enable: false" time="2026-05-15T12:01:45Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T12:01:45Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T12:01:45Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T12:01:45Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T12:01:45Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T12:01:45Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T12:01:45Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T12:01:45Z" level=info msg="[result] NO PROXY: " New PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h found after retrigger for component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h found for Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-rcr8h reason: Completed << Timeline ------------------------------ • [0.336 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:545 ------------------------------ • [778.589 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-gvccyx [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:159 Timeline >> PipelineRun python-component-gvccyx-on-pull-request-bfpzv found for Component build-e2e-lwpm/python-component-gvccyx PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: ResolvingTaskRef PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun has not been created yet for the Component build-e2e-lwpm/python-component-gvccyx PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun has not been created yet for the Component build-e2e-lwpm/python-component-gvccyx PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Running PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: PipelineRunStopping PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: PipelineRunStopping PipelineRun python-component-gvccyx-on-pull-request-bfpzv reason: Failed attempt 1/3: PipelineRun "python-component-gvccyx-on-pull-request-bfpzv" failed: pod: python-component-gvccyx-on-159d97b9256f5c63f6d8957290e9f9c1-pod | init container: prepare 2026/05/15 12:07:33 Entrypoint initialization pod: python-component-gvccyx-on-159d97b9256f5c63f6d8957290e9f9c1-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Executing: oras blob fetch --registry-config /tmp/use-oci.sh.jRbr7U/auth-uiaLT4.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d to /var/workdir/source pod: python-component-gvccyx-on-159d97b9256f5c63f6d8957290e9f9c1-pod | container step-push: time="2026-05-15T12:07:42Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092" time="2026-05-15T12:07:42Z" level=info msg="[param] image-digest: sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb" time="2026-05-15T12:07:42Z" level=info msg="[param] containerfile: docker/Dockerfile" time="2026-05-15T12:07:42Z" level=info msg="[param] context: python-component" time="2026-05-15T12:07:42Z" level=info msg="[param] tag-suffix: .dockerfile" time="2026-05-15T12:07:42Z" level=info msg="[param] artifact-type: application/vnd.konflux.dockerfile" time="2026-05-15T12:07:42Z" level=info msg="[param] source: source" time="2026-05-15T12:07:42Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-15T12:07:42Z" level=info msg="[param] alternative-filename: Dockerfile" time="2026-05-15T12:07:44Z" level=info msg="oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:ffd28202c9986c5d94661920f703a80e22067b16c44cec7491e91293831bf6c7" logger=CliExecutor time="2026-05-15T12:07:44Z" level=info msg="Containerfile '/var/workdir/source/python-component/docker/Dockerfile' is pushed to registry with tag: sha256-16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb.dockerfile" {"image_ref":"quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:ffd28202c9986c5d94661920f703a80e22067b16c44cec7491e91293831bf6c7"} pod: python-component-gvccyx-on-84786f78626669bcbf7e101fd18da259-pod | init container: prepare 2026/05/15 12:07:33 Entrypoint initialization pod: python-component-gvccyx-on-84786f78626669bcbf7e101fd18da259-pod | init container: place-scripts 2026/05/15 12:07:39 Decoded script /tekton/scripts/script-1-q5gbr 2026/05/15 12:07:39 Decoded script /tekton/scripts/script-2-z9fwl pod: python-component-gvccyx-on-84786f78626669bcbf7e101fd18da259-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Executing: oras blob fetch --registry-config /tmp/use-oci.sh.gdUxBl/auth-8IpyT9.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: python-component-gvccyx-on-84786f78626669bcbf7e101fd18da259-pod | container step-sast-shell-check: + source /utils.sh ++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache ++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index + trap 'handle_error /tekton/results/TEST_OUTPUT' EXIT + [[ -z '' ]] + PROJECT_NAME=python-component-gvccyx + echo 'INFO: The PROJECT_NAME used is: python-component-gvccyx' INFO: The PROJECT_NAME used is: python-component-gvccyx + ca_bundle=/mnt/trusted-ca/ca-bundle.crt + '[' -f /mnt/trusted-ca/ca-bundle.crt ']' INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt + echo 'INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt' + cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' + update-ca-trust ++ rpm -q --queryformat '%{NAME}-%{VERSION}-%{RELEASE}\n' ShellCheck + PACKAGE_VERSION=ShellCheck-0.10.0-3.el9 + OUTPUT_FILE=shellcheck-results.json + SOURCE_CODE_DIR=/var/workdir/source + declare -a ALL_TARGETS + IFS=, + read -ra TARGET_ARRAY + for d in "${TARGET_ARRAY[@]}" + potential_path=/var/workdir/source/. ++ realpath -m /var/workdir/source/. + resolved_path=/var/workdir/source + [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]] + ALL_TARGETS+=("$resolved_path") + '[' -z '' ']' + '[' -r /sys/fs/cgroup/cpu.max ']' + read -r quota period + '[' 800000 '!=' max ']' + '[' -n 100000 ']' + '[' 100000 -gt 0 ']' + export SC_JOBS=8 + SC_JOBS=8 + echo 'INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh' + /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh Looking for shell scripts................ done + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample + CSGREP_OPTS=(--mode=json --strip-path-prefix="$SOURCE_CODE_DIR"/ --remove-duplicates --embed-context=3 --set-scan-prop="ShellCheck:${PACKAGE_VERSION}") + [[ true == \t\r\u\e ]] + CSGREP_EVENT_FILTER='\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|' + CSGREP_EVENT_FILTER+='2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|' + CSGREP_EVENT_FILTER+='2218|2224|2225|2242|2256|2258|2261)\]$' + CSGREP_OPTS+=(--event="$CSGREP_EVENT_FILTER") + csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 '--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$' ./shellcheck-results/empty.json ./shellcheck-results/sc-118.json ./shellcheck-results/sc-131.json ./shellcheck-results/sc-132.json ./shellcheck-results/sc-134.json ./shellcheck-results/sc-85.json ./shellcheck-results/sc-88.json ./shellcheck-results/sc-90.json ./shellcheck-results/sc-93.json ./shellcheck-results/sc-96.json ./shellcheck-results/sc-99.json + [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]] + KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git + PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives + KFP_DIR=known-false-positives + KFP_CLONED=0 + mkdir known-false-positives + [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]] + echo -n 'INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... ' + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives ++ head -1 curl: (6) Could not resolve host: gitlab.cee.redhat.com INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered ShellCheck results have been saved to shellcheck-results.json + [[ 0 -eq 0 ]] + echo 'WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered' + echo 'ShellCheck results have been saved to shellcheck-results.json' + csgrep --mode=evtstat shellcheck-results.json + csgrep --mode=sarif shellcheck-results.json + TEST_OUTPUT= + parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif + TEST_NAME=sast-shell-check-oci-ta + TEST_RESULT_FORMAT=sarif + TEST_RESULT_FILE=shellcheck-results.sarif + '[' -z sast-shell-check-oci-ta ']' + '[' -z sarif ']' + '[' -z shellcheck-results.sarif ']' + '[' '!' -f shellcheck-results.sarif ']' + '[' sarif = sarif ']' +++ jq -rce '(if (.runs[].results | length > 0) then "FAILURE" else "SUCCESS" end)' shellcheck-results.sarif +++ jq -rce '(.runs[].results | length)' shellcheck-results.sarif ++ make_result_json -r SUCCESS -f 0 ++ local RESULT= ++ local SUCCESSES=0 ++ local FAILURES=0 ++ local WARNINGS=0 ++ local 'NOTE=For details, check Tekton task log.' ++ local NAMESPACE=default ++ local OUTPUT ++ local OPTIND opt ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ RESULT=SUCCESS ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ FAILURES=0 ++ getopts :r:s:f:w:t:n: opt ++ shift 4 ++ '[' -z SUCCESS ']' ++ case "${RESULT}" in ++++ date -u --iso-8601=seconds +++ jq -rce --arg date 2026-05-15T12:07:44+00:00 --arg result SUCCESS --arg note 'For details, check Tekton task log.' --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input '{ result: $result, timestamp: $date, note: $note, namespace: $namespace, successes: $successes|tonumber, failures: $failures|tonumber, warnings: $warnings|tonumber }' ++ OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + TEST_OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ jq .failures + '[' 0 -gt 0 ']' + echo '{"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + tee /tekton/results/TEST_OUTPUT {"result":"SUCCESS","timestamp":"2026-05-15T12:07:44+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0} + handle_error /tekton/results/TEST_OUTPUT + exit_code=0 + '[' 0 -ne 0 ']' + exit 0 pod: python-component-gvccyx-on-84786f78626669bcbf7e101fd18da259-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Attaching to quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb shellcheck-results.sarif:application/sarif+json Preparing shellcheck-results.sarif Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading da808faebf6f shellcheck-results.sarif Uploaded da808faebf6f shellcheck-results.sarif Uploading 1d602adc88bc application/vnd.oci.image.manifest.v1+json Uploaded 1d602adc88bc application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb Digest: sha256:1d602adc88bcf41f9ac3b45dcdfb851f1d107cd7b9da2ae845be792ea186e189 No excluded-findings.json exists. Skipping upload. pod: python-component-gvccyx-on-b2fc7334a69dd5255dccf22b5a33be67-pod | init container: prepare 2026/05/15 11:59:52 Entrypoint initialization pod: python-component-gvccyx-on-b2fc7334a69dd5255dccf22b5a33be67-pod | init container: place-scripts 2026/05/15 11:59:54 Decoded script /tekton/scripts/script-0-htkc8 2026/05/15 11:59:54 Decoded script /tekton/scripts/script-1-95qqk pod: python-component-gvccyx-on-b2fc7334a69dd5255dccf22b5a33be67-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778846398.4224179,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778846398.896027,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ bf8035c0926a41ccb5e0fa677bb42382d4d79092 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778846398.8960714,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778846398.9192305,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision bf8035c0926a41ccb5e0fa677bb42382d4d79092 directly. pod: python-component-gvccyx-on-b2fc7334a69dd5255dccf22b5a33be67-pod | container step-symlink-check: Running symlink check pod: python-component-gvccyx-on-b2fc7334a69dd5255dccf22b5a33be67-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d) Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.cH5hnb/auth-9ZbWR4.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092.git SOURCE_ARTIFACT Uploading 0bd74197e337 SOURCE_ARTIFACT Uploaded 0bd74197e337 SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:70f736bfe4d4c601132983a078d4d104c255a562cb87ee567b0d17a016416108 Artifacts created pod: python-component-gvccyx-on-b88f0199ed2282b629615ebc36b0b594-pod | init container: prepare 2026/05/15 12:04:33 Entrypoint initialization pod: python-component-gvccyx-on-b88f0199ed2282b629615ebc36b0b594-pod | init container: place-scripts 2026/05/15 12:05:05 Decoded script /tekton/scripts/script-0-m998q 2026/05/15 12:05:05 Decoded script /tekton/scripts/script-1-hpnrq 2026/05/15 12:05:05 Decoded script /tekton/scripts/script-2-6jfr2 pod: python-component-gvccyx-on-b88f0199ed2282b629615ebc36b0b594-pod | container step-build: [2026-05-15T12:07:19,613430877+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Running konflux-build-cli time="2026-05-15T12:07:21Z" level=info msg="[param] image: quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092" time="2026-05-15T12:07:21Z" level=info msg="[param] images: [quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb]" time="2026-05-15T12:07:21Z" level=info msg="[param] buildah-format: docker" time="2026-05-15T12:07:21Z" level=info msg="[param] always-build-index: false" time="2026-05-15T12:07:21Z" level=info msg="[param] additional-tags: [python-component-gvccyx-on-pull-request-bfpzv-build-image-index]" time="2026-05-15T12:07:21Z" level=info msg="[param] output-manifest-path: /index-build-data/manifest_data.json" time="2026-05-15T12:07:21Z" level=info msg="[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST" time="2026-05-15T12:07:21Z" level=info msg="[param] result-path-image-url: /tekton/results/IMAGE_URL" time="2026-05-15T12:07:21Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-15T12:07:21Z" level=info msg="[param] result-path-images: /tekton/results/IMAGES" time="2026-05-15T12:07:21Z" level=info msg="Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092" time="2026-05-15T12:07:21Z" level=info msg="buildah [stdout] 359b9dd90edca5152590dde766e4e6ef13966db74d7ef2272b9461404a5788c1" logger=CliExecutor time="2026-05-15T12:07:21Z" level=info msg="Skipping image index generation. Returning results for single image." {"image_digest":"sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb","image_url":"quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092","image_ref":"quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb","images":"quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb"} pod: python-component-gvccyx-on-b88f0199ed2282b629615ebc36b0b594-pod | container step-create-sbom: The manifest_data.json file does not exist. Skipping the SBOM creation... pod: python-component-gvccyx-on-b88f0199ed2282b629615ebc36b0b594-pod | container step-upload-sbom: [2026-05-15T12:07:22,419557515+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' The index.spdx.json file does not exists. Skipping the SBOM upload... pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | init container: prepare 2026/05/15 12:00:48 Entrypoint initialization pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | init container: place-scripts 2026/05/15 12:00:53 Decoded script /tekton/scripts/script-1-ktqxp 2026/05/15 12:00:53 Decoded script /tekton/scripts/script-2-cm665 2026/05/15 12:00:53 Decoded script /tekton/scripts/script-3-fcn5m 2026/05/15 12:00:53 Decoded script /tekton/scripts/script-4-gww2s 2026/05/15 12:00:53 Decoded script /tekton/scripts/script-5-hj8bh pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Executing: oras blob fetch --registry-config /tmp/use-oci.sh.xNXCPB/auth-nTA5JG.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-build: [2026-05-15T12:01:44,625321122+00:00] Validate context path [2026-05-15T12:01:44,628828985+00:00] Update CA trust [2026-05-15T12:01:44,629925346+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-15T12:01:51,400801309+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-15T12:01:51,454816070+00:00] Prepare system (architecture: x86_64) [2026-05-15T12:01:51,540620188+00:00] Setup prefetched Trying to pull registry.access.redhat.com/ubi9/python-312-minimal:9.7-1777392261... Getting image source signatures Checking if image destination supports signatures Copying blob sha256:72c1da5df399264a8c6b035c246d023523ff0af5682c2e2ceb489c33addd8186 Copying blob sha256:c770e69088fa05bea8942da1c1e3fa6066cc7c288153d81443e0c9435861e0b1 Copying config sha256:7deab7336ecc64e21c0ac1da4d7eccb836d77efe5f446769d0a7d0ea4383930d Writing manifest to image destination Storing signatures [2026-05-15T12:02:04,478705183+00:00] Unsetting proxy { "architecture": "x86_64", "build-date": "2026-05-15T12:01:51Z", "com.redhat.component": "python-312-container", "com.redhat.license_terms": "https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI", "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream", "description": "Python 3.12 available as container is a base platform for building and running various Python 3.12 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python's elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.", "distribution-scope": "public", "io.buildah.version": "1.42.2", "io.buildpacks.stack.id": "com.redhat.stacks.ubi9-python-312-minimal", "io.k8s.description": "Python 3.12 available as container is a base platform for building and running various Python 3.12 applications and frameworks. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python's elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms.", "io.k8s.display-name": "Python 3.12", "io.openshift.expose-services": "8080:http", "io.openshift.tags": "builder,python,python312,python-312,rh-python312", "maintainer": "SoftwareCollections.org ", "name": "ubi9/python-312-minimal", "org.opencontainers.image.created": "2026-05-15T12:01:51Z", "org.opencontainers.image.revision": "bf8035c0926a41ccb5e0fa677bb42382d4d79092", "release": "1777392261", "summary": "Minimal platform for building and running Python 3.12 applications", "url": "https://catalog.redhat.com/en/search?searchType=containers", "usage": "s2i build https://github.com/sclorg/s2i-python-container.git --context-dir=3.12-minimal/test/setup-test-app/ ubi9/python-312-minimal python-sample-app", "vcs-ref": "bf8035c0926a41ccb5e0fa677bb42382d4d79092", "vcs-type": "git", "vendor": "Red Hat, Inc.", "version": "9.7", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/sample-multi-component", "quay.expires-after": "5d" } [2026-05-15T12:02:04,521063338+00:00] Register sub-man Adding the entitlement to the build [2026-05-15T12:02:04,524370235+00:00] Add secrets [2026-05-15T12:02:04,543855521+00:00] Run buildah build [2026-05-15T12:02:04,545006312+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=bf8035c0926a41ccb5e0fa677bb42382d4d79092 --label org.opencontainers.image.revision=bf8035c0926a41ccb5e0fa677bb42382d4d79092 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-15T12:01:51Z --label org.opencontainers.image.created=2026-05-15T12:01:51Z --annotation org.opencontainers.image.revision=bf8035c0926a41ccb5e0fa677bb42382d4d79092 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-15T12:01:51Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.qGvs5o -t quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 . STEP 1/10: FROM registry.access.redhat.com/ubi9/python-312-minimal:9.7-1777392261 STEP 2/10: EXPOSE 8081/tcp STEP 3/10: ENV FLASK_PORT=8081 STEP 4/10: WORKDIR /projects STEP 5/10: COPY . . STEP 6/10: RUN if [ -f requirements.txt ]; then pip install -r requirements.txt; elif [ `ls -1q *.txt | wc -l` == 1 ]; then pip install -r *.txt; fi Collecting Flask==2.3.3 (from -r requirements.txt (line 1)) Downloading flask-2.3.3-py3-none-any.whl.metadata (3.6 kB) Collecting Werkzeug>=2.3.7 (from Flask==2.3.3->-r requirements.txt (line 1)) Downloading werkzeug-3.1.8-py3-none-any.whl.metadata (4.0 kB) Collecting Jinja2>=3.1.2 (from Flask==2.3.3->-r requirements.txt (line 1)) Downloading jinja2-3.1.6-py3-none-any.whl.metadata (2.9 kB) Collecting itsdangerous>=2.1.2 (from Flask==2.3.3->-r requirements.txt (line 1)) Downloading itsdangerous-2.2.0-py3-none-any.whl.metadata (1.9 kB) Collecting click>=8.1.3 (from Flask==2.3.3->-r requirements.txt (line 1)) Downloading click-8.3.3-py3-none-any.whl.metadata (2.6 kB) Collecting blinker>=1.6.2 (from Flask==2.3.3->-r requirements.txt (line 1)) Downloading blinker-1.9.0-py3-none-any.whl.metadata (1.6 kB) Collecting MarkupSafe>=2.0 (from Jinja2>=3.1.2->Flask==2.3.3->-r requirements.txt (line 1)) Downloading markupsafe-3.0.3-cp312-cp312-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl.metadata (2.7 kB) Downloading flask-2.3.3-py3-none-any.whl (96 kB) Downloading blinker-1.9.0-py3-none-any.whl (8.5 kB) Downloading click-8.3.3-py3-none-any.whl (110 kB) Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB) Downloading jinja2-3.1.6-py3-none-any.whl (134 kB) Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB) Downloading markupsafe-3.0.3-cp312-cp312-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB) Installing collected packages: MarkupSafe, itsdangerous, click, blinker, Werkzeug, Jinja2, Flask Successfully installed Flask-2.3.3 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 blinker-1.9.0 click-8.3.3 itsdangerous-2.2.0 [notice] A new release of pip is available: 24.2 -> 26.1.1 [notice] To update, run: pip install --upgrade pip STEP 7/10: CMD [ "python", "./app.py" ] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json STEP 9/10: COPY labels.json /root/buildinfo/labels.json STEP 10/10: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="bf8035c0926a41ccb5e0fa677bb42382d4d79092" "org.opencontainers.image.revision"="bf8035c0926a41ccb5e0fa677bb42382d4d79092" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/sample-multi-component" "quay.expires-after"="5d" "build-date"="2026-05-15T12:01:51Z" "org.opencontainers.image.created"="2026-05-15T12:01:51Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 --> 11bd51d8a94a Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 11bd51d8a94a248d3bf3d7ae0c9965d2a79281d4481794496d674fedd229f91c [2026-05-15T12:02:07,219593496+00:00] Unsetting proxy [2026-05-15T12:02:07,220936414+00:00] Add metadata Recording base image digests used registry.access.redhat.com/ubi9/python-312-minimal:9.7-1777392261 registry.access.redhat.com/ubi9/python-312-minimal:9.7-1777392261@sha256:3748c2b2908ade249fc7197f3d357562e18adeb37ce15621bda818fc7e8c0582 Getting image source signatures Copying blob sha256:5fab1081fe13f687bfb36950b0cb69daaa62602523f04152332218ad12b3f6d4 Copying blob sha256:bb24329e281c372fcdf5da3e7b9c0c4615f87f560e91f3e951c851fcaf595968 Copying blob sha256:73dd5047f87493ec5a883a7efcc591fcf9fd17284490e83ae258105607396e34 Copying config sha256:11bd51d8a94a248d3bf3d7ae0c9965d2a79281d4481794496d674fedd229f91c Writing manifest to image destination [2026-05-15T12:02:09,985042938+00:00] End build pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-push: [2026-05-15T12:02:10,356436542+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-15T12:02:13,741287705+00:00] Convert image [2026-05-15T12:02:13,742304059+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:python-component-gvccyx-on-pull-request-bfpzv-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 docker://quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:python-component-gvccyx-on-pull-request-bfpzv-build-container Getting image source signatures Copying blob sha256:5fab1081fe13f687bfb36950b0cb69daaa62602523f04152332218ad12b3f6d4 Copying blob sha256:73dd5047f87493ec5a883a7efcc591fcf9fd17284490e83ae258105607396e34 Copying blob sha256:bb24329e281c372fcdf5da3e7b9c0c4615f87f560e91f3e951c851fcaf595968 Copying config sha256:11bd51d8a94a248d3bf3d7ae0c9965d2a79281d4481794496d674fedd229f91c Writing manifest to image destination [2026-05-15T12:02:22,690394458+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 docker://quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 Getting image source signatures Copying blob sha256:5fab1081fe13f687bfb36950b0cb69daaa62602523f04152332218ad12b3f6d4 Copying blob sha256:73dd5047f87493ec5a883a7efcc591fcf9fd17284490e83ae258105607396e34 Copying blob sha256:bb24329e281c372fcdf5da3e7b9c0c4615f87f560e91f3e951c851fcaf595968 Copying config sha256:11bd51d8a94a248d3bf3d7ae0c9965d2a79281d4481794496d674fedd229f91c Writing manifest to image destination sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aebquay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-15T12:02:24,895862693+00:00] End push pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-sbom-syft-generate: [2026-05-15T12:02:25,001561442+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-15T12:02:29,247191058+00:00] End sbom-syft-generate pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-prepare-sboms: [2026-05-15T12:02:29,942484844+00:00] Prepare SBOM [2026-05-15T12:02:29,980178821+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-15 12:02:42,188 [INFO] mobster.log: Logging level set to 20 2026-05-15 12:02:42,788 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/python-312-minimal@sha256:3748c2b2908ade249fc7197f3d357562e18adeb37ce15621bda818fc7e8c0582 2026-05-15 12:02:44,539 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual workflow will be used. Parent SBOM used for contextualization: https://konflux-ci.dev/spdxdocs/quay.io/redhat-user-workloads/osci-rhel-containers-tenant/rhel-9-7/python-312-minimal-9-7@sha256:5d4123bf22aea9d5e71cf448f0302b79e7b47dec44709e85b40c1a0b3189ca94-1d4260fd-df09-42f5-995e-ee49605545ac 2026-05-15 12:02:44,687 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.logging: {"event_type": "contextual_sbom_matching_statistics", "parent_sbom_reference": "https://konflux-ci.dev/spdxdocs/quay.io/redhat-user-workloads/osci-rhel-containers-tenant/rhel-9-7/python-312-minimal-9-7@sha256:5d4123bf22aea9d5e71cf448f0302b79e7b47dec44709e85b40c1a0b3189ca94-1d4260fd-df09-42f5-995e-ee49605545ac", "component_sbom_reference": "https://konflux-ci.dev/spdxdocs/quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb-40d98002-1891-4892-b535-f83e9b4f9b8c", "component_packages": {"total": 126, "matched": 119, "unmatched_all": 7, "unmatched_component_only": 7, "unmatched_without_unique_id": 0}, "parent_packages": {"total": 136, "matched": 129, "unmatched_all": 7, "unmatched_removed_at_build": 7, "unmatched_without_unique_id": 0}, "match_methods": {"by_checksum": 0, "by_verification_code": 110, "by_purl": 9, "total": 119}, "match_origins": {"syft_to_syft": 119, "syft_to_hermeto": 0, "hermeto_to_syft": 0, "hermeto_to_hermeto": 0}, "duplicate_identifiers": {"checksums": {"count": 0, "details": []}, "verification_codes": {"count": 0, "details": []}, "purls": {"count": 0, "details": []}}} 2026-05-15 12:02:44,687 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-15 12:02:44,688 [INFO] mobster.log: Contextual workflow completed in 2.00s 2026-05-15 12:02:44,886 [INFO] mobster.main: Exiting with code 0. [2026-05-15T12:02:45,683658174+00:00] End prepare-sboms pod: python-component-gvccyx-on-e6114dd60620c3ff4b9f4a0119724cd2-pod | container step-upload-sbom: [2026-05-15T12:02:46,284044482+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb] to [quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:sha256-16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:91be76ebb07bda75d4034554b1bdf57444f9a40ca3e518225152a28a7b0ab9de [2026-05-15T12:03:13,574288599+00:00] End upload-sbom pod: python-component-gvccyx-on-fe59ec89dfacaa57abd499fe16323baf-pod | init container: prepare 2026/05/15 12:07:33 Entrypoint initialization pod: python-component-gvccyx-on-fe59ec89dfacaa57abd499fe16323baf-pod | init container: place-scripts 2026/05/15 12:07:39 Decoded script /tekton/scripts/script-1-74jw9 2026/05/15 12:07:39 Decoded script /tekton/scripts/script-2-2zqfz pod: python-component-gvccyx-on-fe59ec89dfacaa57abd499fe16323baf-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Executing: oras blob fetch --registry-config /tmp/use-oci.sh.ug5gCo/auth-jvTfQ9.json quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:0bd74197e33750db3463ab9e17187b1cc3912b6f0b7793338fa8c4d67a54270d to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: python-component-gvccyx-on-fe59ec89dfacaa57abd499fe16323baf-pod | container step-sast-snyk-check: INFO: The PROJECT_NAME used is: python-component-gvccyx INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' {"result":"SKIPPED","timestamp":"2026-05-15T12:07:44+00:00","note":"Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key 'snyk_token' containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)","namespace":"default","successes":0,"failures":0,"warnings":0} pod: python-component-gvccyx-on-fe59ec89dfacaa57abd499fe16323baf-pod | container step-upload: No sast_snyk_check_out.sarif exists. Skipping upload. No excluded-findings.json exists. Skipping upload. pod: python-component-gvccyx-on-pull-request-bfpzv-apply-tags-pod | init container: prepare 2026/05/15 12:07:33 Entrypoint initialization pod: python-component-gvccyx-on-pull-request-bfpzv-apply-tags-pod | container step-apply-additional-tags: time="2026-05-15T12:07:41Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092" time="2026-05-15T12:07:41Z" level=info msg="[param] digest: sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb" time="2026-05-15T12:07:41Z" level=info msg="[param] tags-from-image-label: konflux.additional-tags" time="2026-05-15T12:07:43Z" level=warning msg="No tags given in 'konflux.additional-tags' image label" {"tags":[]} pod: python-component-gvccyx-on-pull-request-bfpzv-clamav-scan-pod | init container: prepare 2026/05/15 12:07:32 Entrypoint initialization pod: python-component-gvccyx-on-pull-request-bfpzv-clamav-scan-pod | init container: place-scripts 2026/05/15 12:07:37 Decoded script /tekton/scripts/script-0-vd25j 2026/05/15 12:07:37 Decoded script /tekton/scripts/script-1-vpv75 pod: python-component-gvccyx-on-pull-request-bfpzv-clamav-scan-pod | container step-extract-and-scan-image: Starting clamd ... clamd is ready! Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb. Detected container image. Processing image manifests. Running "oc image extract" on image of arch amd64 Scanning image for arch amd64. This operation may take a while. ----------- SCAN SUMMARY ----------- Infected files: 0 Time: 8.838 sec (0 m 8 s) Start Date: 2026:05:15 12:07:52 End Date: 2026:05:15 12:08:01 Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28001/Fri May 15 06:24:48 2026 Database version: 28001 [ { "filename": "/work/logs/clamscan-result-log-amd64.json", "namespace": "required_checks", "successes": 2 } ] {"timestamp":"1778846881","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1778846881","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1778846881","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092", "digests": ["sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb"]}} pod: python-component-gvccyx-on-pull-request-bfpzv-clamav-scan-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx Attaching to quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json Preparing clamscan-result-amd64.log Preparing clamscan-ec-test-amd64.json Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading dcc16579f175 clamscan-result-amd64.log Uploading 70da8c1780c4 clamscan-ec-test-amd64.json Uploaded dcc16579f175 clamscan-result-amd64.log Uploaded 70da8c1780c4 clamscan-ec-test-amd64.json Uploading c760c1334279 application/vnd.oci.image.manifest.v1+json Uploaded c760c1334279 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-lwpm/python-component-gvccyx:on-pr-bf8035c0926a41ccb5e0fa677bb42382d4d79092@sha256:16ff34bfad2fe9ba0fb79fc22176905250e8c11c6463d2befeebc75c91cc5aeb Digest: sha256:c760c1334279351c82a03b8c92ee8b1d6da3f6da31e6dcfb613d5334040f7324 pod: python-component-gvccyx-on-pull-request-bfpzv-init-pod | init container: prepare 2026/05/15 11:59:36 Entrypoint initialization pod: python-component-gvccyx-on-pull-request-bfpzv-init-pod | container step-init: time="2026-05-15T11:59:38Z" level=info msg="[param] enable: false" time="2026-05-15T11:59:38Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-15T11:59:38Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-15T11:59:38Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-15T11:59:38Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-15T11:59:38Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-15T11:59:38Z" level=info msg="Cache proxy is disabled via param" time="2026-05-15T11:59:38Z" level=info msg="[result] HTTP PROXY: " time="2026-05-15T11:59:38Z" level=info msg="[result] NO PROXY: " New PipelineRun python-component-gvccyx-on-pull-request-b6h7x found after retrigger for component build-e2e-lwpm/python-component-gvccyx PipelineRun python-component-gvccyx-on-pull-request-b6h7x found for Component build-e2e-lwpm/python-component-gvccyx PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: ResolvingTaskRef PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Running PipelineRun python-component-gvccyx-on-pull-request-b6h7x reason: Completed << Timeline ------------------------------ • [2.232 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:164 Timeline >> merged result sha: e0de5f44ec5455ec48fbbcdc4afbc7ee35992622 for PR #33411 << Timeline ------------------------------ • [20.205 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:174 Timeline >> Push PipelineRun has not been created yet for the component build-e2e-lwpm/python-component-gvccyx << Timeline ------------------------------ • [3.609 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:190 Timeline >> PR #33412 got created with sha 0bd209d2b5fbbdc7f70f60bf45ff6b0733614ed2 << Timeline ------------------------------ • [20.586 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:205 Timeline >> on pull PiplelineRun has not been created yet for the PR << Timeline ------------------------------ • [131.325 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:560 Timeline >> found pipelinerun: gh-test-custom-branch-psluto-on-pull-request-7sxhm found pipelinerun: gh-test-custom-branch-psluto-on-pull-request-7sxhm waiting for one minute and expecting to not trigger a PipelineRun << Timeline ------------------------------ • [0.276 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:590 ------------------------------ • [20.851 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:264 Timeline >> build status annotation value: {"pac":{"state":"error","error-id":53,"error-message":"53: Git repository is already handled by Pipelines as Code"},"message":"done"} build status: &{State:error MergeUrl: ConfigurationTime: ErrorInfo:{ErrId:53 ErrMessage:53: Git repository is already handled by Pipelines as Code}} << Timeline ------------------------------ • [20.382 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:595 Timeline >> PipelineRun is not been retriggered yet for the component build-e2e-cpyj/gh-test-custom-branch-psluto New PipelineRun gh-test-custom-branch-psluto-on-push-42h86 found after retrigger (old: gh-test-custom-branch-psluto-on-push-rcr8h) << Timeline ------------------------------ • [160.184 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:631 Timeline >> PipelineRun gh-test-custom-branch-psluto-on-push-42h86 found for Component build-e2e-cpyj/gh-test-custom-branch-psluto PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Running PipelineRun gh-test-custom-branch-psluto-on-push-42h86 reason: Completed << Timeline ------------------------------ • [6.801 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:650 ------------------------------ • [1.302 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:666 Timeline >> Found purge PR with id: 3 << Timeline ------------------------------ • [FAILED] [1206.874 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace [It] should lead to a nudge PR creation for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:412 [FAILED] Timed out after 1200.000s. timed out when waiting for component nudge PR to be created in build-nudge-child-ygccbr repository Expected : false to be true In [It] at: /workspace/source/e2e-tests/tests/renovate.go:427 @ 05/15/26 12:22:21.273 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace [It] merging the PR should be successful for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:429 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/renovate.go:429 @ 05/15/26 12:22:28.147 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace [It] Verify the nudge updated the contents [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:440 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/renovate.go:440 @ 05/15/26 12:22:28.147 ------------------------------ [ReportAfterSuite] PASSED [542.400 seconds] [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo ------------------------------ Summarizing 2 Failures: [FAIL] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created [It] triggered PipelineRun is for component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:190 [FAIL] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace [It] should lead to a nudge PR creation for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:427 Ran 63 of 157 Specs in 1936.401 seconds FAIL! -- 61 Passed | 2 Failed | 1 Pending | 93 Skipped Ginkgo ran 1 suite in 36m15.900287426s Test Suite Failed