<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="157" disabled="104" errors="0" failures="1" time="1515.979983201">
      <testsuite name="Build Service E2E" package="/workspace/source/e2e-tests/tests" tests="157" disabled="7" skipped="97" errors="0" failures="1" time="1515.979983201" timestamp="2026-05-07T13:02:02">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value=""></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1778158695"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value="build-service &amp;&amp; github"></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="true"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="5"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="41.79936481">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /workspace/source/e2e-tests/tests/renovate.go:72 @ 05/07/26 13:02:02.862&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-zqts&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /workspace/source/e2e-tests/tests/renovate.go:72 @ 05/07/26 13:02:14.372 (11.51s)&#xA;&gt; Enter [It] creates component with nudges - /workspace/source/e2e-tests/tests/renovate.go:235 @ 05/07/26 13:02:14.373&#xA;Image repository for component gh-multi-component-child-zqts in namespace build-e2e-elxj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-child-zqts in namespace build-e2e-elxj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component gh-multi-component-parent-zqts in namespace build-e2e-elxj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /workspace/source/e2e-tests/tests/renovate.go:235 @ 05/07/26 13:02:44.661 (30.289s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:02:44.661&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:02:44.661 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="42.002946075">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /workspace/source/e2e-tests/tests/renovate.go:259 @ 05/07/26 13:02:44.662&#xA;PipelineRun has not been created yet for the component build-e2e-elxj/gh-multi-component-parent-zqts&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /workspace/source/e2e-tests/tests/renovate.go:259 @ 05/07/26 13:03:26.665 (42.002s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:03:26.665&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:03:26.665 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="440.204475915">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/e2e-tests/tests/renovate.go:274 @ 05/07/26 13:03:26.666&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml found for Component build-e2e-elxj/gh-multi-component-parent-zqts&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /workspace/source/e2e-tests/tests/renovate.go:274 @ 05/07/26 13:10:46.87 (7m20.204s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:46.87&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:46.87 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.071398817">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/e2e-tests/tests/renovate.go:285 @ 05/07/26 13:10:46.871&#xA;PipelineRun gh-multi-component-child-zqts-on-pull-request-ndsxp found for Component build-e2e-elxj/gh-multi-component-child-zqts&#xA;PipelineRun gh-multi-component-child-zqts-on-pull-request-ndsxp reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /workspace/source/e2e-tests/tests/renovate.go:285 @ 05/07/26 13:10:46.942 (71ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:46.942&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:46.942 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.22447515">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /workspace/source/e2e-tests/tests/renovate.go:289 @ 05/07/26 13:10:46.943&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /workspace/source/e2e-tests/tests/renovate.go:289 @ 05/07/26 13:10:47.167 (224ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:47.167&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:47.167 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="2.605221132">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /workspace/source/e2e-tests/tests/renovate.go:307 @ 05/07/26 13:10:47.168&#xA;merged result sha: 7be273d8d73b5e84bce5d8f4d10591d8610c9b17 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /workspace/source/e2e-tests/tests/renovate.go:307 @ 05/07/26 13:10:49.772 (2.605s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:49.773&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:49.773 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="6.283696091">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/e2e-tests/tests/renovate.go:318 @ 05/07/26 13:10:49.773&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /workspace/source/e2e-tests/tests/renovate.go:318 @ 05/07/26 13:10:56.057 (6.283s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:56.057&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:56.057 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="0.213685618">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /workspace/source/e2e-tests/tests/renovate.go:358 @ 05/07/26 13:10:56.058&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /workspace/source/e2e-tests/tests/renovate.go:358 @ 05/07/26 13:10:56.271 (213ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:56.271&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:56.271 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="2.476459792">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /workspace/source/e2e-tests/tests/renovate.go:375 @ 05/07/26 13:10:56.272&#xA;merged result sha: b9e58c432e38be7dae0d06a7afc8a07d6edc8180 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /workspace/source/e2e-tests/tests/renovate.go:375 @ 05/07/26 13:10:58.748 (2.476s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:58.748&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:10:58.748 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="20.205521279">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/e2e-tests/tests/renovate.go:385 @ 05/07/26 13:10:58.749&#xA;Push PipelineRun has not been created yet for the component build-e2e-elxj/gh-multi-component-parent-zqts&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /workspace/source/e2e-tests/tests/renovate.go:385 @ 05/07/26 13:11:18.954 (20.205s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:11:18.954&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:11:18.954 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="360.222076311">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /workspace/source/e2e-tests/tests/renovate.go:401 @ 05/07/26 13:11:18.955&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx found for Component build-e2e-elxj/gh-multi-component-parent-zqts&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running&#xA;PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Completed&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /workspace/source/e2e-tests/tests/renovate.go:401 @ 05/07/26 13:17:19.177 (6m0.222s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:17:19.177&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:17:19.177 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="202.931809121">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /workspace/source/e2e-tests/tests/renovate.go:412 @ 05/07/26 13:17:19.178&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /workspace/source/e2e-tests/tests/renovate.go:412 @ 05/07/26 13:20:42.109 (3m22.931s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:20:42.109&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:20:42.109 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="2.168948532">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /workspace/source/e2e-tests/tests/renovate.go:429 @ 05/07/26 13:20:42.11&#xA;merged result sha: e8de8fcd48c8f16efea046722ae51e13cd9908ae for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /workspace/source/e2e-tests/tests/renovate.go:429 @ 05/07/26 13:20:44.279 (2.168s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:20:44.279&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:20:44.279 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Build Service E2E" status="passed" time="33.90817288">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /workspace/source/e2e-tests/tests/renovate.go:440 @ 05/07/26 13:20:44.28&#xA;Verifying Dockerfile.tmp updated to sha sha256:935d6782eb8eb690e00023beaca6da3ab88eb819e931514b7e936b6809de80b4content: FROM quay.io/redhat-appstudio-qe/build-e2e-elxj/gh-multi-component-parent-zqts@sha256:935d6782eb8eb690e00023beaca6da3ab88eb819e931514b7e936b6809de80b4&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /workspace/source/e2e-tests/tests/renovate.go:440 @ 05/07/26 13:20:44.517 (237ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /workspace/source/e2e-tests/tests/renovate.go:214 @ 05/07/26 13:20:44.518&#xA;&lt; Exit [AfterAll] component update with renovate - /workspace/source/e2e-tests/tests/renovate.go:214 @ 05/07/26 13:21:18.187 (33.67s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:21:18.188&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/renovate.go:28 @ 05/07/26 13:21:18.188 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Build Service E2E" status="passed" time="73.104951248">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /workspace/source/e2e-tests/tests/annotations.go:35 @ 05/07/26 13:02:02.86&#xA;&lt; Exit [BeforeAll] test build annotations - /workspace/source/e2e-tests/tests/annotations.go:35 @ 05/07/26 13:02:04.782 (1.923s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /workspace/source/e2e-tests/tests/annotations.go:69 @ 05/07/26 13:02:04.783&#xA;Image repository for component test-annotations-fgxrif in namespace build-e2e-qvcc do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /workspace/source/e2e-tests/tests/annotations.go:69 @ 05/07/26 13:02:14.912 (10.129s)&#xA;&gt; Enter [It] handles invalid request annotation - /workspace/source/e2e-tests/tests/annotations.go:89 @ 05/07/26 13:02:14.912&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /workspace/source/e2e-tests/tests/annotations.go:89 @ 05/07/26 13:03:15.162 (1m0.25s)&#xA;&gt; Enter [AfterAll] test build annotations - /workspace/source/e2e-tests/tests/annotations.go:51 @ 05/07/26 13:03:15.162&#xA;&lt; Exit [AfterAll] test build annotations - /workspace/source/e2e-tests/tests/annotations.go:51 @ 05/07/26 13:03:15.964 (802ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/annotations.go:24 @ 05/07/26 13:03:15.965&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/annotations.go:24 @ 05/07/26 13:03:15.965 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="23.837063854">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /workspace/source/e2e-tests/tests/secret_lookup.go:32 @ 05/07/26 13:02:02.861&#xA;&lt; Exit [BeforeAll] test build secret lookup - /workspace/source/e2e-tests/tests/secret_lookup.go:32 @ 05/07/26 13:02:06.411 (3.55s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /workspace/source/e2e-tests/tests/secret_lookup.go:100 @ 05/07/26 13:02:06.411&#xA;&lt; Exit [BeforeAll] when two secrets are created - /workspace/source/e2e-tests/tests/secret_lookup.go:100 @ 05/07/26 13:02:06.555 (144ms)&#xA;&gt; Enter [It] creates first component - /workspace/source/e2e-tests/tests/secret_lookup.go:123 @ 05/07/26 13:02:06.556&#xA;Image repository for component component-one-empr in namespace build-e2e-ghwp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-one-empr in namespace build-e2e-ghwp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates first component - /workspace/source/e2e-tests/tests/secret_lookup.go:123 @ 05/07/26 13:02:26.698 (20.142s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:26.698&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:26.698 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="20.135130382">
              <system-err>&gt; Enter [It] creates second component - /workspace/source/e2e-tests/tests/secret_lookup.go:140 @ 05/07/26 13:02:26.699&#xA;Image repository for component component-two-xosf in namespace build-e2e-ghwp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component component-two-xosf in namespace build-e2e-ghwp do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates second component - /workspace/source/e2e-tests/tests/secret_lookup.go:140 @ 05/07/26 13:02:46.834 (20.135s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:46.834&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:46.834 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="0.062945672">
              <system-err>&gt; Enter [It] check first component annotation has errors - /workspace/source/e2e-tests/tests/secret_lookup.go:158 @ 05/07/26 13:02:46.834&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /workspace/source/e2e-tests/tests/secret_lookup.go:158 @ 05/07/26 13:02:46.897 (63ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:46.897&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:02:46.897 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="40.268311229">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /workspace/source/e2e-tests/tests/secret_lookup.go:178 @ 05/07/26 13:02:46.899&#xA;PipelineRun has not been created yet for the component build-e2e-ghwp/component-two-xosf&#xA;PipelineRun has not been created yet for the component build-e2e-ghwp/component-two-xosf&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /workspace/source/e2e-tests/tests/secret_lookup.go:178 @ 05/07/26 13:03:27.167 (40.268s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:03:27.167&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:03:27.167 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="passed" time="123.117915035">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /workspace/source/e2e-tests/tests/secret_lookup.go:193 @ 05/07/26 13:03:27.168&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /workspace/source/e2e-tests/tests/secret_lookup.go:193 @ 05/07/26 13:05:27.169 (2m0.001s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /workspace/source/e2e-tests/tests/secret_lookup.go:61 @ 05/07/26 13:05:27.169&#xA;&lt; Exit [AfterAll] test build secret lookup - /workspace/source/e2e-tests/tests/secret_lookup.go:61 @ 05/07/26 13:05:30.286 (3.116s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:05:30.286&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/secret_lookup.go:25 @ 05/07/26 13:05:30.286 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="22.777004201">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /workspace/source/e2e-tests/tests/multi_component.go:40 @ 05/07/26 13:02:02.866&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /workspace/source/e2e-tests/tests/multi_component.go:40 @ 05/07/26 13:02:05.5 (2.634s)&#xA;&gt; Enter [It] creates component with context directory go-component - /workspace/source/e2e-tests/tests/multi_component.go:106 @ 05/07/26 13:02:05.5&#xA;Image repository for component go-component-sjurmt in namespace build-e2e-qlxk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-sjurmt in namespace build-e2e-qlxk do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory go-component - /workspace/source/e2e-tests/tests/multi_component.go:106 @ 05/07/26 13:02:25.642 (20.142s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:25.642&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:25.643 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-sjurmt [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="20.196541491">
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:125 @ 05/07/26 13:02:25.643&#xA;PipelineRun has not been created yet for the component build-e2e-qlxk/go-component-sjurmt&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:125 @ 05/07/26 13:02:45.839 (20.196s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:45.84&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:45.84 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-sjurmt [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="passed" time="0.428105271">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:140 @ 05/07/26 13:02:45.84&#xA;&lt; Exit [It] should lead to a PaC PR creation for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:140 @ 05/07/26 13:02:46.268 (428ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:46.268&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:02:46.268 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-sjurmt [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="failed" time="1156.007235095">
              <failure message="Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0014f3eb0&gt;: &#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare&#xA;    2026/05/07 13:20:44 Entrypoint initialization&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-07T13:20:51Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare&#xA;    2026/05/07 13:14:18 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: &#xA;    [2026-05-07T13:14:51,584962014+00:00] Validate context path&#xA;    [2026-05-07T13:14:51,590303285+00:00] Update CA trust&#xA;    [2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-07T13:14:56,951544177+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;    Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;    Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;    Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;    Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-07T13:15:33,418488104+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-07T13:14:56Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;      &#34;release&#34;: &#34;14&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:14:56Z&#34;&#xA;    }&#xA;    [2026-05-07T13:15:33,484601313+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-07T13:15:33,489717883+00:00] Add secrets&#xA;    [2026-05-07T13:15:33,571648026+00:00] Run buildah build&#xA;    [2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;    STEP 2/10: COPY . .&#xA;    STEP 3/10: RUN go mod download&#xA;    go: no module dependencies to download&#xA;    STEP 4/10: RUN go build -o ./main&#xA;    STEP 5/10: ENV PORT 8081&#xA;    STEP 6/10: EXPOSE 8081&#xA;    STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.revision&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-07T13:14:56Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:14:56Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    --&gt; 6963114e8776&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    [2026-05-07T13:15:42,307519763+00:00] Unsetting proxy&#xA;    [2026-05-07T13:15:42,309735970+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:16:02,009262643+00:00] End build&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: &#xA;    [2026-05-07T13:16:02,893116313+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:16:28,482527788+00:00] Convert image&#xA;    [2026-05-07T13:16:28,484050620+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:17:08,572194317+00:00] Push image with git revision&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;    Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;    [2026-05-07T13:17:11,300002294+00:00] End push&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: &#xA;    [2026-05-07T13:17:11,968884365+00:00] Generate SBOM&#xA;    Running syft on the image&#xA;    Running syft on the source code&#xA;    [0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;    [2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: &#xA;    [2026-05-07T13:17:34,403794295+00:00] Prepare SBOM&#xA;    [2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster&#xA;    Skipping SBOM validation&#xA;    2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20&#xA;    2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;    2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;    2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s&#xA;    2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0.&#xA;    [2026-05-07T13:18:04,506846248+00:00] End prepare-sboms&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:18:05,099117708+00:00] Upload SBOM&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Pushing sbom to registry&#xA;    [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#xA;    WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;    WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;    Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json].&#xA;    &#xA;    quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285&#xA;    [2026-05-07T13:18:41,291872523+00:00] End upload-sbom&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare&#xA;    2026/05/07 13:19:12 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: &#xA;    [2026-05-07T13:19:28,080583581+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Running konflux-build-cli&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d&#34; logger=CliExecutor&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;    {&#34;image_digest&#34;:&#34;sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;}&#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: &#xA;    The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:19:31,866426705+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare&#xA;    2026/05/07 13:20:28 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare\n2026/05/07 13:20:44 Entrypoint initialization\n\npod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-05-07T13:20:51Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare\n2026/05/07 13:14:18 Entrypoint initialization\n\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: \n[2026-05-07T13:14:51,584962014+00:00] Validate context path\n[2026-05-07T13:14:51,590303285+00:00] Update CA trust\n[2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;\n[2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile\nChecking if /var/workdir/cachi2/output/bom.json exists.\nCould not find prefetched sbom. No content_sets found for ICM\n[2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)\n[2026-05-07T13:14:56,951544177+00:00] Setup prefetched\nTrying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...\nGetting image source signatures\nChecking if image destination supports signatures\nCopying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4\nCopying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83\nCopying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09\nCopying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3\nCopying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301\nWriting manifest to image destination\nStoring signatures\n[2026-05-07T13:15:33,418488104+00:00] Unsetting proxy\n{\n  \&#34;architecture\&#34;: \&#34;x86_64\&#34;,\n  \&#34;build-date\&#34;: \&#34;2026-05-07T13:14:56Z\&#34;,\n  \&#34;com.redhat.component\&#34;: \&#34;go-toolset-container\&#34;,\n  \&#34;com.redhat.license_terms\&#34;: \&#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI\&#34;,\n  \&#34;description\&#34;: \&#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety fea...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0014f3eb0&gt;: &#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare&#xA;    2026/05/07 13:20:44 Entrypoint initialization&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-07T13:20:51Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare&#xA;    2026/05/07 13:14:18 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: &#xA;    [2026-05-07T13:14:51,584962014+00:00] Validate context path&#xA;    [2026-05-07T13:14:51,590303285+00:00] Update CA trust&#xA;    [2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-07T13:14:56,951544177+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;    Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;    Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;    Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;    Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-07T13:15:33,418488104+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-07T13:14:56Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;      &#34;release&#34;: &#34;14&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:14:56Z&#34;&#xA;    }&#xA;    [2026-05-07T13:15:33,484601313+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-07T13:15:33,489717883+00:00] Add secrets&#xA;    [2026-05-07T13:15:33,571648026+00:00] Run buildah build&#xA;    [2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;    STEP 2/10: COPY . .&#xA;    STEP 3/10: RUN go mod download&#xA;    go: no module dependencies to download&#xA;    STEP 4/10: RUN go build -o ./main&#xA;    STEP 5/10: ENV PORT 8081&#xA;    STEP 6/10: EXPOSE 8081&#xA;    STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.revision&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-07T13:14:56Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:14:56Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    --&gt; 6963114e8776&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    [2026-05-07T13:15:42,307519763+00:00] Unsetting proxy&#xA;    [2026-05-07T13:15:42,309735970+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:16:02,009262643+00:00] End build&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: &#xA;    [2026-05-07T13:16:02,893116313+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:16:28,482527788+00:00] Convert image&#xA;    [2026-05-07T13:16:28,484050620+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:17:08,572194317+00:00] Push image with git revision&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;    Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;    [2026-05-07T13:17:11,300002294+00:00] End push&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: &#xA;    [2026-05-07T13:17:11,968884365+00:00] Generate SBOM&#xA;    Running syft on the image&#xA;    Running syft on the source code&#xA;    [0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;    [2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: &#xA;    [2026-05-07T13:17:34,403794295+00:00] Prepare SBOM&#xA;    [2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster&#xA;    Skipping SBOM validation&#xA;    2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20&#xA;    2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;    2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;    2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s&#xA;    2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0.&#xA;    [2026-05-07T13:18:04,506846248+00:00] End prepare-sboms&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:18:05,099117708+00:00] Upload SBOM&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Pushing sbom to registry&#xA;    [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#xA;    WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;    WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;    Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json].&#xA;    &#xA;    quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285&#xA;    [2026-05-07T13:18:41,291872523+00:00] End upload-sbom&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare&#xA;    2026/05/07 13:19:12 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: &#xA;    [2026-05-07T13:19:28,080583581+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Running konflux-build-cli&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d&#34; logger=CliExecutor&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;    {&#34;image_digest&#34;:&#34;sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;}&#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: &#xA;    The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:19:31,866426705+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare&#xA;    2026/05/07 13:20:28 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare\n2026/05/07 13:20:44 Entrypoint initialization\n\npod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-05-07T13:20:51Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare\n2026/05/07 13:14:18 Entrypoint initialization\n\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: \n[2026-05-07T13:14:51,584962014+00:00] Validate context path\n[2026-05-07T13:14:51,590303285+00:00] Update CA trust\n[2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;\n[2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile\nChecking if /var/workdir/cachi2/output/bom.json exists.\nCould not find prefetched sbom. No content_sets found for ICM\n[2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)\n[2026-05-07T13:14:56,951544177+00:00] Setup prefetched\nTrying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...\nGetting image source signatures\nChecking if image destination supports signatures\nCopying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4\nCopying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83\nCopying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09\nCopying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3\nCopying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301\nWriting manifest to image destination\nStoring signatures\n[2026-05-07T13:15:33,418488104+00:00] Unsetting proxy\n{\n  \&#34;architecture\&#34;: \&#34;x86_64\&#34;,\n  \&#34;build-date\&#34;: \&#34;2026-05-07T13:14:56Z\&#34;,\n  \&#34;com.redhat.component\&#34;: \&#34;go-toolset-container\&#34;,\n  \&#34;com.redhat.license_terms\&#34;: \&#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI\&#34;,\n  \&#34;description\&#34;: \&#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety fea...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:161 @ 05/07/26 13:22:00.319&#xA;</failure>
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:159 @ 05/07/26 13:02:46.269&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr found for Component build-e2e-qlxk/go-component-sjurmt&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: ResolvingTaskRef&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Failed&#xA;attempt 1/3: PipelineRun &#34;go-component-sjurmt-on-pull-request-bqtlr&#34; failed: &#xA; pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | init container: prepare&#xA;2026/05/07 13:03:45 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | init container: place-scripts&#xA;2026/05/07 13:03:46 Decoded script /tekton/scripts/script-0-t7mnw&#xA;2026/05/07 13:03:46 Decoded script /tekton/scripts/script-1-z2s2b&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159039.8199284,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159040.8045466,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159040.8045993,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159040.8418798,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2 directly.&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:a17eece08b065bab33a090e04ce6c2864cb6e550cf93071eb29d3d8bac014181)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.6YOjke/auth-FUDPnj.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2.git SOURCE_ARTIFACT&#xA;Uploading a17eece08b06 SOURCE_ARTIFACT&#xA;Uploaded  a17eece08b06 SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:c2c74448515b9ff3a13e9ac1a4d99b3151e68778bfece25be44174791c0a6923&#xA;Artifacts created&#xA;&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-bqtlr-init-pod | init container: prepare&#xA;2026/05/07 13:03:11 Entrypoint initialization&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-bqtlr-init-pod | container step-init: &#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-07T13:03:36Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun go-component-sjurmt-on-pull-request-9hp2f found after retrigger for component build-e2e-qlxk/go-component-sjurmt&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f found for Component build-e2e-qlxk/go-component-sjurmt&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: &#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: ResolvingTaskRef&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Failed&#xA;attempt 2/3: PipelineRun &#34;go-component-sjurmt-on-pull-request-9hp2f&#34; failed: &#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-apply-tags-pod | init container: prepare&#xA;2026/05/07 13:10:51 Entrypoint initialization&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-07T13:10:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;&#xA;time=&#34;2026-05-07T13:10:53Z&#34; level=info msg=&#34;[param] digest: sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;&#xA;time=&#34;2026-05-07T13:10:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-07T13:10:55Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | init container: prepare&#xA;2026/05/07 13:07:00 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | init container: place-scripts&#xA;2026/05/07 13:07:01 Decoded script /tekton/scripts/script-1-zml85&#xA;2026/05/07 13:07:01 Decoded script /tekton/scripts/script-2-st5jx&#xA;2026/05/07 13:07:01 Decoded script /tekton/scripts/script-3-tlqhx&#xA;2026/05/07 13:07:01 Decoded script /tekton/scripts/script-4-5kmzd&#xA;2026/05/07 13:07:01 Decoded script /tekton/scripts/script-5-b2rfm&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.pftgfO/auth-W9vpyn.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-build: &#xA;[2026-05-07T13:07:07,840012564+00:00] Validate context path&#xA;[2026-05-07T13:07:07,845570457+00:00] Update CA trust&#xA;[2026-05-07T13:07:07,847173070+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:07:10,856269062+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-07T13:07:10,914489136+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-07T13:07:10,940252597+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-07T13:07:30,201014887+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-07T13:07:10Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;  &#34;release&#34;: &#34;14&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.18.9&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:07:10Z&#34;&#xA;}&#xA;[2026-05-07T13:07:30,260039158+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-07T13:07:30,265144368+00:00] Add secrets&#xA;[2026-05-07T13:07:30,284717971+00:00] Run buildah build&#xA;[2026-05-07T13:07:30,286451414+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=7b0f81b51d2b0af1defcc8becb02629a884630a2 --label org.opencontainers.image.revision=7b0f81b51d2b0af1defcc8becb02629a884630a2 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:07:10Z --label org.opencontainers.image.created=2026-05-07T13:07:10Z --annotation org.opencontainers.image.revision=7b0f81b51d2b0af1defcc8becb02629a884630a2 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:07:10Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.OSGz6r -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;STEP 2/10: COPY . .&#xA;STEP 3/10: RUN go mod download&#xA;go: no module dependencies to download&#xA;STEP 4/10: RUN go build -o ./main&#xA;STEP 5/10: ENV PORT 8081&#xA;STEP 6/10: EXPOSE 8081&#xA;STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;7b0f81b51d2b0af1defcc8becb02629a884630a2&#34; &#34;org.opencontainers.image.revision&#34;=&#34;7b0f81b51d2b0af1defcc8becb02629a884630a2&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-07T13:07:10Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:07:10Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;--&gt; b467e20446a9&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b&#xA;[2026-05-07T13:07:33,603340000+00:00] Unsetting proxy&#xA;[2026-05-07T13:07:33,605369436+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;Getting image source signatures&#xA;Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:07:43,642100126+00:00] End build&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-push: &#xA;[2026-05-07T13:07:44,055787957+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:07:49,312819492+00:00] Convert image&#xA;[2026-05-07T13:07:49,314527335+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-9hp2f-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-9hp2f-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:08:25,302494658+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Getting image source signatures&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b&#xA;Writing manifest to image destination&#xA;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-07T13:08:27,021215683+00:00] End push&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-07T13:08:27,331096344+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-07T13:08:49,454947851+00:00] End sbom-syft-generate&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-07T13:08:50,146912506+00:00] Prepare SBOM&#xA;[2026-05-07T13:08:50,245963230+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-07 13:09:10,847 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-07 13:09:15,049 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;2026-05-07 13:09:18,490 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:19,388 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:22,592 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:23,906 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:26,215 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:27,357 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:29,221 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:30,148 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:09:30,149 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-07 13:09:30,149 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-07 13:09:30,152 [INFO] mobster.log: Contextual workflow completed in 16.10s&#xA;2026-05-07 13:09:31,355 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-07T13:09:32,350505482+00:00] End prepare-sboms&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-upload-sbom: &#xA;[2026-05-07T13:09:32,677529447+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:cccab370360b3b8f17aad765afca0eccd896b0e44d31f26575b576fd5067d247&#xA;[2026-05-07T13:10:11,763734233+00:00] End upload-sbom&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | init container: prepare&#xA;2026/05/07 13:10:27 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | init container: place-scripts&#xA;2026/05/07 13:10:29 Decoded script /tekton/scripts/script-0-j7b7h&#xA;2026/05/07 13:10:29 Decoded script /tekton/scripts/script-1-5cl4r&#xA;2026/05/07 13:10:29 Decoded script /tekton/scripts/script-2-8x4mz&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-build: &#xA;[2026-05-07T13:10:32,986324527+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2]&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-sjurmt-on-pull-request-9hp2f-build-image-index]&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;buildah [stdout] f1fc3abb75e7c51bf72a2e84115a3462d7fade76eeed3da9ad2374b3a0fd4af8&#34; logger=CliExecutor&#xA;time=&#34;2026-05-07T13:10:35Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;}&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-07T13:10:36,358885181+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | init container: prepare&#xA;2026/05/07 13:10:41 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | init container: place-scripts&#xA;2026/05/07 13:10:43 Decoded script /tekton/scripts/script-0-shmxk&#xA;2026/05/07 13:10:43 Decoded script /tekton/scripts/script-1-fcwg8&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 29.155 sec (0 m 29 s)&#xA;Start Date: 2026:05:07 13:12:13&#xA;End Date:   2026:05:07 13:12:42&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27993/Wed May  6 06:24:57 2026 Database version: 27993&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778159562&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778159562&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778159562&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;, &#34;digests&#34;: [&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;]}}&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 5feb3c68be8e clamscan-result-amd64.log&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 2c1b4b780a30 clamscan-ec-test-amd64.json&#xA;Uploaded  2c1b4b780a30 clamscan-ec-test-amd64.json&#xA;Uploaded  5feb3c68be8e clamscan-result-amd64.log&#xA;Uploading 23141b1a6962 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  23141b1a6962 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#xA;Digest: sha256:23141b1a69623479cc09f45c4286ca51e18c1667f844d90e1cfcec5e10fb2fd2&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | init container: prepare&#xA;2026/05/07 13:05:33 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | init container: place-scripts&#xA;2026/05/07 13:05:36 Decoded script /tekton/scripts/script-0-m7rck&#xA;2026/05/07 13:05:36 Decoded script /tekton/scripts/script-1-zkbvm&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159140.9397016,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159141.4959207,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 7b0f81b51d2b0af1defcc8becb02629a884630a2 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159141.4959753,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159141.5298877,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 7b0f81b51d2b0af1defcc8becb02629a884630a2 directly.&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.KDSziO/auth-VPtte1.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2.git SOURCE_ARTIFACT&#xA;Uploading 4ad727487fbc SOURCE_ARTIFACT&#xA;Uploaded  4ad727487fbc SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:9b83a2f2f08c94c6d585bfa506efe3de4e695b1c692e1ba9b23fc4ed0c1c46d7&#xA;Artifacts created&#xA;&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-init-pod | init container: prepare&#xA;2026/05/07 13:05:18 Entrypoint initialization&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-init-pod | container step-init: &#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-07T13:05:24Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | init container: prepare&#xA;2026/05/07 13:11:01 Entrypoint initialization&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.FLShbX/auth-xI9xBv.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] image-digest: sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] context: go-component&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-07T13:11:08Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:b88cd3f20b75da22576693f53f642bb992c5ea0fcf4ccbf9f6a720ecaf9480f5&#34; logger=CliExecutor&#xA;time=&#34;2026-05-07T13:11:08Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/go-component/docker/Dockerfile&#39; is pushed to registry with tag: sha256-418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:b88cd3f20b75da22576693f53f642bb992c5ea0fcf4ccbf9f6a720ecaf9480f5&#34;}&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | init container: prepare&#xA;2026/05/07 13:10:43 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | init container: place-scripts&#xA;2026/05/07 13:10:51 Decoded script /tekton/scripts/script-1-xlqwl&#xA;2026/05/07 13:10:51 Decoded script /tekton/scripts/script-2-q4ksj&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.GTdtBO/auth-6ClKWN.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=go-component-sjurmt&#xA;INFO: The PROJECT_NAME used is: go-component-sjurmt&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: go-component-sjurmt&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-129.json ./shellcheck-results/sc-130.json ./shellcheck-results/sc-133.json ./shellcheck-results/sc-84.json ./shellcheck-results/sc-87.json ./shellcheck-results/sc-89.json ./shellcheck-results/sc-91.json ./shellcheck-results/sc-95.json ./shellcheck-results/sc-98.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-07T13:10:55+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:55+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading 28c29bfb38c3 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  28c29bfb38c3 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#xA;Digest: sha256:28c29bfb38c3d6269fd56b3aa371eb7b5eecae1c2a127af88df7a878ec6908f6&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | init container: prepare&#xA;2026/05/07 13:10:41 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/07 13:10:43 Decoded script /tekton/scripts/script-1-9htc9&#xA;2026/05/07 13:10:43 Decoded script /tekton/scripts/script-2-9k54q&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.BRESG1/auth-Ce5qg6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: go-component-sjurmt&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:11:07+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | init container: prepare&#xA;2026/05/07 13:11:01 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | init container: place-scripts&#xA;2026/05/07 13:11:03 Decoded script /tekton/scripts/script-0-r5xk6&#xA;2026/05/07 13:11:03 Decoded script /tekton/scripts/script-1-j4r6h&#xA;&#xA;pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | container step-rpms-signature-scan: &#xA;+ set -o pipefail&#xA;+ rpm_verifier --image-url quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 --image-digest sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 --workdir /tmp&#xA;Image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#xA;No unsigned RPMs found&#xA;&#xA;{&#39;keys&#39;: {&#39;199e2f91fd431d51&#39;: 419, &#39;unsigned&#39;: 0}}&#xA;====================================&#xA;&#xA;Final results:&#xA;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 419, &#34;unsigned&#34;: 0}}&#xA;Images processed:&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;, &#34;digests&#34;: [&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;]}}&#xA;&#xA;pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | container step-output-results: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;++ cat /tmp/status&#xA;+ status=SUCCESS&#xA;++ cat /tmp/results&#xA;+ rpms_data=&#39;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 419, &#34;unsigned&#34;: 0}}&#39;&#xA;++ cat /tmp/images_processed&#xA;+ images_processed=&#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;, &#34;digests&#34;: [&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;]}}&#39;&#xA;+ &#39;[&#39; SUCCESS == ERROR &#39;]&#39;&#xA;+ note=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-07T13:12:20+00:00 --arg result SUCCESS --arg note &#39;Task rpms-signature-scan completed successfully&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:12:20+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:12:20+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:12:20+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:12:20+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:12:20+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ echo &#39;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 419, &#34;unsigned&#34;: 0}}&#39;&#xA;+ tee /tekton/results/RPMS_DATA&#xA;{&#34;keys&#34;: {&#34;199e2f91fd431d51&#34;: 419, &#34;unsigned&#34;: 0}}&#xA;+ echo &#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;, &#34;digests&#34;: [&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;]}}&#39;&#xA;+ tee /tekton/results/IMAGES_PROCESSED&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;, &#34;digests&#34;: [&#34;sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#34;]}}&#xA;&#xA; pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | init container: prepare&#xA;2026/05/07 13:10:41 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | init container: place-scripts&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-0-6scm5&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-1-cqm5m&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-2-zd6gl&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-3-tgbnw&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-4-rxd28&#xA;2026/05/07 13:10:42 Decoded script /tekton/scripts/script-5-v9pgn&#xA;&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-set-skip-for-bundles: &#xA;2026/05/07 13:11:07 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-app-check: &#xA;time=&#34;2026-05-07T13:11:07Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-07T13:11:08Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 for platform amd64&#34;&#xA;time=&#34;2026-05-07T13:11:08Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1652724893/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;USER 1001 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-07T13:12:23Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-07T13:12:46Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-07T13:12:46Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-07T13:12:47Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 will be paired with digest sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;time=&#34;2026-05-07T13:12:47Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 120,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 22673,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 947,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-app-set-outcome: &#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778159568&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA;pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1778159568&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | init container: prepare&#xA;2026/05/07 13:10:51 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | init container: place-scripts&#xA;2026/05/07 13:10:52 Decoded script /tekton/scripts/script-1-btb7w&#xA;2026/05/07 13:10:52 Decoded script /tekton/scripts/script-2-48tsl&#xA;&#xA;pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.keR7N1/auth-zZhhye.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=go-component-sjurmt&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: go-component-sjurmt&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: The PROJECT_NAME used is: go-component-sjurmt&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-07T13:10:56+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-07T13:10:56+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading b36de1b717f3 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  b36de1b717f3 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2&#xA;Digest: sha256:b36de1b717f3079fdf7305d8e93b3b8bd3480134e1c75286be6801dda4aa7611&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | init container: prepare&#xA;2026/05/07 13:05:51 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | init container: place-scripts&#xA;2026/05/07 13:06:00 Decoded script /tekton/scripts/script-0-2sfwr&#xA;2026/05/07 13:06:00 Decoded script /tekton/scripts/script-2-bqxlk&#xA;&#xA;pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-skip-ta: &#xA;&#xA;pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-07T13:06:54Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-07T13:06:57Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-07T13:06:57Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-07T13:06:57Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;New PipelineRun go-component-sjurmt-on-pull-request-lzx85 found after retrigger for component build-e2e-qlxk/go-component-sjurmt&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 found for Component build-e2e-qlxk/go-component-sjurmt&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: ResolvingTaskRef&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping&#xA;PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Failed&#xA;an error happened during storing pipelineRun log build-e2e-qlxk:go-component-sjurmt-on-pull-request-lzx85: container &#34;place-scripts&#34; in pod &#34;go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod&#34; is waiting to start: PodInitializing&#xA;failed to get logs for PipelineRun build-e2e-qlxk:go-component-sjurmt-on-pull-request-lzx85: container &#34;place-scripts&#34; in pod &#34;go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod&#34; is waiting to start: PodInitializing&#xA;attempt 3/3: PipelineRun &#34;go-component-sjurmt-on-pull-request-lzx85&#34; failed: &#xA; pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare&#xA;2026/05/07 13:20:44 Entrypoint initialization&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;&#xA;time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-07T13:20:51Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare&#xA;2026/05/07 13:14:18 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts&#xA;2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg&#xA;2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5&#xA;2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2&#xA;2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r&#xA;2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: &#xA;[2026-05-07T13:14:51,584962014+00:00] Validate context path&#xA;[2026-05-07T13:14:51,590303285+00:00] Update CA trust&#xA;[2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-07T13:14:56,951544177+00:00] Setup prefetched&#xA;Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;Getting image source signatures&#xA;Checking if image destination supports signatures&#xA;Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;Writing manifest to image destination&#xA;Storing signatures&#xA;[2026-05-07T13:15:33,418488104+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-07T13:14:56Z&#34;,&#xA;  &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;  &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;  &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;  &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;  &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;  &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;  &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;  &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;  &#34;release&#34;: &#34;14&#34;,&#xA;  &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;  &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;  &#34;version&#34;: &#34;1.18.9&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:14:56Z&#34;&#xA;}&#xA;[2026-05-07T13:15:33,484601313+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-07T13:15:33,489717883+00:00] Add secrets&#xA;[2026-05-07T13:15:33,571648026+00:00] Run buildah build&#xA;[2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . &#xA;STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;STEP 2/10: COPY . .&#xA;STEP 3/10: RUN go mod download&#xA;go: no module dependencies to download&#xA;STEP 4/10: RUN go build -o ./main&#xA;STEP 5/10: ENV PORT 8081&#xA;STEP 6/10: EXPOSE 8081&#xA;STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.revision&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-07T13:14:56Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:14:56Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;--&gt; 6963114e8776&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;[2026-05-07T13:15:42,307519763+00:00] Unsetting proxy&#xA;[2026-05-07T13:15:42,309735970+00:00] Add metadata&#xA;Recording base image digests used&#xA;registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;Getting image source signatures&#xA;Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:16:02,009262643+00:00] End build&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: &#xA;[2026-05-07T13:16:02,893116313+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:16:28,482527788+00:00] Convert image&#xA;[2026-05-07T13:16:28,484050620+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:17:08,572194317+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;Getting image source signatures&#xA;Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;Writing manifest to image destination&#xA;sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-07T13:17:11,300002294+00:00] End push&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-07T13:17:11,968884365+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-07T13:17:34,403794295+00:00] Prepare SBOM&#xA;[2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s&#xA;2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-07T13:18:04,506846248+00:00] End prepare-sboms&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: &#xA;[2026-05-07T13:18:05,099117708+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285&#xA;[2026-05-07T13:18:41,291872523+00:00] End upload-sbom&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare&#xA;2026/05/07 13:19:12 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts&#xA;2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464&#xA;2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7&#xA;2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: &#xA;[2026-05-07T13:19:28,080583581+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d&#34; logger=CliExecutor&#xA;time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;}&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-07T13:19:31,866426705+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare&#xA;2026/05/07 13:20:28 Entrypoint initialization&#xA;&#xA; pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0014f3eb0&gt;: &#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare&#xA;    2026/05/07 13:20:44 Entrypoint initialization&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;&#xA;    time=&#34;2026-05-07T13:20:49Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-07T13:20:51Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare&#xA;    2026/05/07 13:14:18 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r&#xA;    2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: &#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -&#xA;    Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source&#xA;    WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;    &#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: &#xA;    [2026-05-07T13:14:51,584962014+00:00] Validate context path&#xA;    [2026-05-07T13:14:51,590303285+00:00] Update CA trust&#xA;    [2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile&#xA;    Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;    Could not find prefetched sbom. No content_sets found for ICM&#xA;    [2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)&#xA;    [2026-05-07T13:14:56,951544177+00:00] Setup prefetched&#xA;    Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...&#xA;    Getting image source signatures&#xA;    Checking if image destination supports signatures&#xA;    Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4&#xA;    Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83&#xA;    Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09&#xA;    Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3&#xA;    Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301&#xA;    Writing manifest to image destination&#xA;    Storing signatures&#xA;    [2026-05-07T13:15:33,418488104+00:00] Unsetting proxy&#xA;    {&#xA;      &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;      &#34;build-date&#34;: &#34;2026-05-07T13:14:56Z&#34;,&#xA;      &#34;com.redhat.component&#34;: &#34;go-toolset-container&#34;,&#xA;      &#34;com.redhat.license_terms&#34;: &#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI&#34;,&#xA;      &#34;description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;distribution-scope&#34;: &#34;public&#34;,&#xA;      &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;      &#34;io.k8s.description&#34;: &#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.&#34;,&#xA;      &#34;io.k8s.display-name&#34;: &#34;Go 1.18.9&#34;,&#xA;      &#34;io.openshift.expose-services&#34;: &#34;&#34;,&#xA;      &#34;io.openshift.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;io.openshift.tags&#34;: &#34;builder,golang,golang118,rh-golang118,go&#34;,&#xA;      &#34;io.s2i.scripts-url&#34;: &#34;image:///usr/libexec/s2i&#34;,&#xA;      &#34;maintainer&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;name&#34;: &#34;rhel9/go-toolset&#34;,&#xA;      &#34;release&#34;: &#34;14&#34;,&#xA;      &#34;summary&#34;: &#34;Platform for building and running Go Applications&#34;,&#xA;      &#34;url&#34;: &#34;https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14&#34;,&#xA;      &#34;vcs-ref&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;vcs-type&#34;: &#34;git&#34;,&#xA;      &#34;vendor&#34;: &#34;Red Hat, Inc.&#34;,&#xA;      &#34;version&#34;: &#34;1.18.9&#34;,&#xA;      &#34;org.opencontainers.image.revision&#34;: &#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#xA;      &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34;,&#xA;      &#34;quay.expires-after&#34;: &#34;5d&#34;,&#xA;      &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:14:56Z&#34;&#xA;    }&#xA;    [2026-05-07T13:15:33,484601313+00:00] Register sub-man&#xA;    Adding the entitlement to the build&#xA;    [2026-05-07T13:15:33,489717883+00:00] Add secrets&#xA;    [2026-05-07T13:15:33,571648026+00:00] Run buildah build&#xA;    [2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . &#xA;    STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14&#xA;    STEP 2/10: COPY . .&#xA;    STEP 3/10: RUN go mod download&#xA;    go: no module dependencies to download&#xA;    STEP 4/10: RUN go build -o ./main&#xA;    STEP 5/10: ENV PORT 8081&#xA;    STEP 6/10: EXPOSE 8081&#xA;    STEP 7/10: CMD [ &#34;./main&#34; ]&#xA;    STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json&#xA;    STEP 9/10: COPY labels.json /root/buildinfo/labels.json&#xA;    STEP 10/10: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.revision&#34;=&#34;8be853ac5f3f626af43e0aff03810770cba4d8b8&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/sample-multi-component&#34; &#34;quay.expires-after&#34;=&#34;5d&#34; &#34;build-date&#34;=&#34;2026-05-07T13:14:56Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:14:56Z&#34;&#xA;    COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    --&gt; 6963114e8776&#xA;    Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    [2026-05-07T13:15:42,307519763+00:00] Unsetting proxy&#xA;    [2026-05-07T13:15:42,309735970+00:00] Add metadata&#xA;    Recording base image digests used&#xA;    registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:16:02,009262643+00:00] End build&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: &#xA;    [2026-05-07T13:16:02,893116313+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    [2026-05-07T13:16:28,482527788+00:00] Convert image&#xA;    [2026-05-07T13:16:28,484050620+00:00] Push image with unique tag&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    [2026-05-07T13:17:08,572194317+00:00] Push image with git revision&#xA;    Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    Getting image source signatures&#xA;    Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6&#xA;    Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3&#xA;    Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22&#xA;    Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49&#xA;    Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5&#xA;    Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb&#xA;    Writing manifest to image destination&#xA;    sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#xA;    [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;    Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;    [2026-05-07T13:17:11,300002294+00:00] End push&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: &#xA;    [2026-05-07T13:17:11,968884365+00:00] Generate SBOM&#xA;    Running syft on the image&#xA;    Running syft on the source code&#xA;    [0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;    [2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: &#xA;    [2026-05-07T13:17:34,403794295+00:00] Prepare SBOM&#xA;    [2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster&#xA;    Skipping SBOM validation&#xA;    2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20&#xA;    2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51&#xA;    2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;    2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;    2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;    2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s&#xA;    2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0.&#xA;    [2026-05-07T13:18:04,506846248+00:00] End prepare-sboms&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:18:05,099117708+00:00] Upload SBOM&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt&#xA;    Pushing sbom to registry&#xA;    [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#xA;    WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;    WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;    Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json].&#xA;    &#xA;    quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285&#xA;    [2026-05-07T13:18:41,291872523+00:00] End upload-sbom&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare&#xA;    2026/05/07 13:19:12 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7&#xA;    2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: &#xA;    [2026-05-07T13:19:28,080583581+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    Running konflux-build-cli&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] buildah-format: docker&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d&#34; logger=CliExecutor&#xA;    time=&#34;2026-05-07T13:19:31Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;    {&#34;image_digest&#34;:&#34;sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef&#34;}&#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: &#xA;    The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;    &#xA;    pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: &#xA;    [2026-05-07T13:19:31,866426705+00:00] Update CA trust&#xA;    INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;    &#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;    The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare&#xA;    2026/05/07 13:20:28 Entrypoint initialization&#xA;    &#xA;     pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts&#xA;    &#xA;    {&#xA;        s: &#34;\n pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare\n2026/05/07 13:20:44 Entrypoint initialization\n\npod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: \ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef\&#34;\ntime=\&#34;2026-05-07T13:20:49Z\&#34; level=info msg=\&#34;[param] tags-from-image-label: konflux.additional-tags\&#34;\ntime=\&#34;2026-05-07T13:20:51Z\&#34; level=warning msg=\&#34;No tags given in &#39;konflux.additional-tags&#39; image label\&#34;\n{\&#34;tags\&#34;:[]}\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare\n2026/05/07 13:14:18 Entrypoint initialization\n\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: \n[2026-05-07T13:14:51,584962014+00:00] Validate context path\n[2026-05-07T13:14:51,590303285+00:00] Update CA trust\n[2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;\n[2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile\nChecking if /var/workdir/cachi2/output/bom.json exists.\nCould not find prefetched sbom. No content_sets found for ICM\n[2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)\n[2026-05-07T13:14:56,951544177+00:00] Setup prefetched\nTrying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...\nGetting image source signatures\nChecking if image destination supports signatures\nCopying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4\nCopying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83\nCopying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09\nCopying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3\nCopying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301\nWriting manifest to image destination\nStoring signatures\n[2026-05-07T13:15:33,418488104+00:00] Unsetting proxy\n{\n  \&#34;architecture\&#34;: \&#34;x86_64\&#34;,\n  \&#34;build-date\&#34;: \&#34;2026-05-07T13:14:56Z\&#34;,\n  \&#34;com.redhat.component\&#34;: \&#34;go-toolset-container\&#34;,\n  \&#34;com.redhat.license_terms\&#34;: \&#34;https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI\&#34;,\n  \&#34;description\&#34;: \&#34;Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety fea...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:161 @ 05/07/26 13:22:00.319&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for component go-component-sjurmt - /workspace/source/e2e-tests/tests/multi_component.go:159 @ 05/07/26 13:22:00.319 (19m14.05s)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /workspace/source/e2e-tests/tests/multi_component.go:68 @ 05/07/26 13:22:00.319&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /workspace/source/e2e-tests/tests/multi_component.go:68 @ 05/07/26 13:22:01.652 (1.332s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:22:01.652&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/multi_component.go:28 @ 05/07/26 13:22:02.276 (624ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:164 @ 05/07/26 13:22:02.278&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:174 @ 05/07/26 13:22:02.279&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:106 @ 05/07/26 13:22:02.279&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-sstdwm [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:125 @ 05/07/26 13:22:02.28&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-sstdwm [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:140 @ 05/07/26 13:22:02.28&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-sstdwm [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:159 @ 05/07/26 13:22:02.28&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:164 @ 05/07/26 13:22:02.281&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:174 @ 05/07/26 13:22:02.281&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:190 @ 05/07/26 13:22:02.281&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:205 @ 05/07/26 13:22:02.282&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:264 @ 05/07/26 13:22:02.282&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Build Service E2E" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="46.574690551">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /workspace/source/e2e-tests/tests/pac_build.go:56 @ 05/07/26 13:02:02.946&#xA;&lt; Exit [BeforeAll] PaC component build - /workspace/source/e2e-tests/tests/pac_build.go:56 @ 05/07/26 13:02:09.382 (6.436s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/e2e-tests/tests/pac_build.go:118 @ 05/07/26 13:02:09.382&#xA;Image repository for component gh-test-custom-default-pmpljn in namespace build-e2e-zzlj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /workspace/source/e2e-tests/tests/pac_build.go:118 @ 05/07/26 13:02:33.862 (24.48s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/e2e-tests/tests/pac_build.go:137 @ 05/07/26 13:02:33.862&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /workspace/source/e2e-tests/tests/pac_build.go:137 @ 05/07/26 13:02:49.52 (15.658s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:02:49.521&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:02:49.521 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.136025258">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/e2e-tests/tests/pac_build.go:154 @ 05/07/26 13:02:49.521&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /workspace/source/e2e-tests/tests/pac_build.go:154 @ 05/07/26 13:02:49.656 (135ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:02:49.657&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:02:49.657 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="20.348070528">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:176 @ 05/07/26 13:02:49.658&#xA;PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:176 @ 05/07/26 13:03:10.006 (20.348s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.006&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.006 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.00036248">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /workspace/source/e2e-tests/tests/pac_build.go:191 @ 05/07/26 13:03:10.007&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /workspace/source/e2e-tests/tests/pac_build.go:191 @ 05/07/26 13:03:10.007 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.007&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.007 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.214697424">
              <system-err>&gt; Enter [It] component build status is set correctly - /workspace/source/e2e-tests/tests/pac_build.go:195 @ 05/07/26 13:03:10.007&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt/pull/1&#34;,&#34;configuration-time&#34;:&#34;Thu, 07 May 2026 13:02:46 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt/pull/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Thu, 07 May 2026 13:02:46 UTC&#xA;&lt; Exit [It] component build status is set correctly - /workspace/source/e2e-tests/tests/pac_build.go:195 @ 05/07/26 13:03:10.222 (214ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.222&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:10.222 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.97659959">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/e2e-tests/tests/pac_build.go:225 @ 05/07/26 13:03:10.222&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/e2e-tests/tests/pac_build.go:225 @ 05/07/26 13:03:12.199 (1.976s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:12.199&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:12.199 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.377314137">
              <system-err>&gt; Enter [It] created image repo is private - /workspace/source/e2e-tests/tests/pac_build.go:243 @ 05/07/26 13:03:12.199&#xA;&lt; Exit [It] created image repo is private - /workspace/source/e2e-tests/tests/pac_build.go:243 @ 05/07/26 13:03:12.576 (377ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:12.577&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:12.577 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="19.256495057">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/e2e-tests/tests/pac_build.go:249 @ 05/07/26 13:03:12.577&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /workspace/source/e2e-tests/tests/pac_build.go:249 @ 05/07/26 13:03:31.833 (19.256s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:31.834&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:31.834 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="0.177298339">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /workspace/source/e2e-tests/tests/pac_build.go:264 @ 05/07/26 13:03:31.834&#xA;&lt; Exit [It] PR branch should not exist in the repo - /workspace/source/e2e-tests/tests/pac_build.go:264 @ 05/07/26 13:03:32.011 (177ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:32.011&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:32.011 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Build Service E2E" status="passed" time="1.418066373">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/e2e-tests/tests/pac_build.go:277 @ 05/07/26 13:03:32.012&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /workspace/source/e2e-tests/tests/pac_build.go:277 @ 05/07/26 13:03:33.43 (1.418s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:33.43&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:03:33.43 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="30.85744289">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/e2e-tests/tests/pac_build.go:303 @ 05/07/26 13:03:33.431&#xA;Image repository for component gh-test-custom-branch-xetniq in namespace build-e2e-zzlj do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /workspace/source/e2e-tests/tests/pac_build.go:303 @ 05/07/26 13:03:44.082 (10.652s)&#xA;&gt; Enter [It] triggers a PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:327 @ 05/07/26 13:03:44.083&#xA;PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;&lt; Exit [It] triggers a PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:327 @ 05/07/26 13:04:04.288 (20.205s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:04:04.288&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:04:04.288 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.244335651">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /workspace/source/e2e-tests/tests/pac_build.go:342 @ 05/07/26 13:04:04.289&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /workspace/source/e2e-tests/tests/pac_build.go:342 @ 05/07/26 13:04:04.533 (244ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:04:04.533&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:04:04.533 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="400.202403131">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /workspace/source/e2e-tests/tests/pac_build.go:360 @ 05/07/26 13:04:04.533&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Completed&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /workspace/source/e2e-tests/tests/pac_build.go:360 @ 05/07/26 13:10:44.735 (6m40.202s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:44.736&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:44.736 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="1.124880734">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /workspace/source/e2e-tests/tests/pac_build.go:365 @ 05/07/26 13:10:44.736&#xA;&lt; Exit [It] image repo and robot account created successfully - /workspace/source/e2e-tests/tests/pac_build.go:365 @ 05/07/26 13:10:45.861 (1.124s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:45.861&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:45.861 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.342153867">
              <system-err>&gt; Enter [It] created image repo is public - /workspace/source/e2e-tests/tests/pac_build.go:384 @ 05/07/26 13:10:45.862&#xA;&lt; Exit [It] created image repo is public - /workspace/source/e2e-tests/tests/pac_build.go:384 @ 05/07/26 13:10:46.204 (342ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:46.204&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:46.204 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.510464719">
              <system-err>&gt; Enter [It] image tag is updated successfully - /workspace/source/e2e-tests/tests/pac_build.go:390 @ 05/07/26 13:10:46.204&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:on-pr-f4bf0b999aa1af629a9b964edf64c90a4c3dc94e successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /workspace/source/e2e-tests/tests/pac_build.go:390 @ 05/07/26 13:10:46.715 (510ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:46.715&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:46.715 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.464614883">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /workspace/source/e2e-tests/tests/pac_build.go:416 @ 05/07/26 13:10:46.715&#xA;&lt; Exit [It] should ensure pruning labels are set - /workspace/source/e2e-tests/tests/pac_build.go:416 @ 05/07/26 13:10:47.18 (464ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:47.18&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:47.18 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.446349665">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/e2e-tests/tests/pac_build.go:433 @ 05/07/26 13:10:47.18&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /workspace/source/e2e-tests/tests/pac_build.go:433 @ 05/07/26 13:10:47.566 (386ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /workspace/source/e2e-tests/tests/pac_build.go:320 @ 05/07/26 13:10:47.567&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /workspace/source/e2e-tests/tests/pac_build.go:320 @ 05/07/26 13:10:47.626 (60ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:47.626&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:10:47.627 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="20.959061315">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /workspace/source/e2e-tests/tests/pac_build.go:448 @ 05/07/26 13:10:47.627&#xA;created file sha: b5979408ea4faa7b4ddf98a4961decd823823c58&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /workspace/source/e2e-tests/tests/pac_build.go:448 @ 05/07/26 13:10:48.38 (753ms)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:458 @ 05/07/26 13:10:48.38&#xA;PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:458 @ 05/07/26 13:11:08.586 (20.206s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:11:08.586&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:11:08.586 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.215189181">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /workspace/source/e2e-tests/tests/pac_build.go:473 @ 05/07/26 13:11:08.587&#xA;&lt; Exit [It] should lead to a PaC init PR update - /workspace/source/e2e-tests/tests/pac_build.go:473 @ 05/07/26 13:11:08.801 (215ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:11:08.802&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:11:08.802 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="220.50057999">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /workspace/source/e2e-tests/tests/pac_build.go:492 @ 05/07/26 13:11:08.802&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Completed&#xA;&lt; Exit [It] PipelineRun should eventually finish - /workspace/source/e2e-tests/tests/pac_build.go:492 @ 05/07/26 13:14:49.303 (3m40.5s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:14:49.303&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:14:49.303 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.456583425">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /workspace/source/e2e-tests/tests/pac_build.go:497 @ 05/07/26 13:14:49.304&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /workspace/source/e2e-tests/tests/pac_build.go:497 @ 05/07/26 13:14:49.76 (456ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:14:49.76&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:14:49.76 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="22.936814317">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /workspace/source/e2e-tests/tests/pac_build.go:513 @ 05/07/26 13:14:49.761&#xA;merged result sha: 7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /workspace/source/e2e-tests/tests/pac_build.go:513 @ 05/07/26 13:14:52.23 (2.469s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:523 @ 05/07/26 13:14:52.23&#xA;PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:523 @ 05/07/26 13:15:12.697 (20.467s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:15:12.697&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:15:12.697 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="594.812033047">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /workspace/source/e2e-tests/tests/pac_build.go:539 @ 05/07/26 13:15:12.698&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;gh-test-custom-branch-xetniq-on-push-c8q26&#34; failed: &#xA; pod: gh-test-custom-branch-xetniq-on-pull-request-cr48h-init-pod | init container: prepare&#xA;2026/05/07 13:04:33 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-pull-request-cr48h-init-pod | container step-init: &#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-07T13:04:35Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-pull-request-tcp7z-init-pod | init container: prepare&#xA;2026/05/07 13:11:19 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-pull-request-tcp7z-init-pod | container step-init: &#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-07T13:11:23Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | init container: prepare&#xA;2026/05/07 13:17:08 Entrypoint initialization&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | init container: place-scripts&#xA;2026/05/07 13:17:15 Decoded script /tekton/scripts/script-1-nxc5p&#xA;2026/05/07 13:17:15 Decoded script /tekton/scripts/script-2-vplgn&#xA;2026/05/07 13:17:15 Decoded script /tekton/scripts/script-3-mm56j&#xA;2026/05/07 13:17:15 Decoded script /tekton/scripts/script-4-27f4s&#xA;2026/05/07 13:17:15 Decoded script /tekton/scripts/script-5-9fwww&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.oyQjqE/auth-qQkDqD.json quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-build: &#xA;[2026-05-07T13:17:30,305627079+00:00] Validate context path&#xA;[2026-05-07T13:17:30,310602679+00:00] Update CA trust&#xA;[2026-05-07T13:17:30,312633765+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:17:37,369754201+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-07T13:17:37,431670857+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-07T13:17:37,538947669+00:00] Setup prefetched&#xA;Trying to pull quay.io/jitesoft/nginx:latest...&#xA;Getting image source signatures&#xA;Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1&#xA;Copying blob sha256:c27fcb7ccfae0ffc78703910ca9ddd5a68dd0508825e673a3b9d06dd618ac0f3&#xA;Copying blob sha256:3478266b4865f4efc58d163e64670ca678ab1de9918b00b890093f6426681f7b&#xA;Copying blob sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153&#xA;Copying config sha256:e8566ed9bc606131964784db37d8103e708ee079caa4ef2be258acfe5e2b5033&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:18:06,190187774+00:00] Unsetting proxy&#xA;{&#xA;  &#34;com.jitesoft.app.alpine.version&#34;: &#34;3.23.3&#34;,&#xA;  &#34;com.jitesoft.app.nginx.version&#34;: &#34;1.29.8&#34;,&#xA;  &#34;com.jitesoft.build.arch&#34;: &#34;amd64&#34;,&#xA;  &#34;com.jitesoft.build.platform&#34;: &#34;linux/amd64&#34;,&#xA;  &#34;com.jitesoft.project.registry.uri&#34;: &#34;registry.gitlab.com/jitesoft/dockerfiles/nginx&#34;,&#xA;  &#34;com.jitesoft.project.repo.issues&#34;: &#34;https://gitlab.com/jitesoft/dockerfiles/nginx/issues&#34;,&#xA;  &#34;com.jitesoft.project.repo.type&#34;: &#34;git&#34;,&#xA;  &#34;com.jitesoft.project.repo.uri&#34;: &#34;https://gitlab.com/jitesoft/dockerfiles/nginx&#34;,&#xA;  &#34;io.artifacthub.package.alternative-locations&#34;: &#34;oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx&#34;,&#xA;  &#34;io.artifacthub.package.logo-url&#34;: &#34;https://jitesoft.com/favicon-96x96.png&#34;,&#xA;  &#34;io.artifacthub.package.readme-url&#34;: &#34;https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md&#34;,&#xA;  &#34;maintainer&#34;: &#34;Johannes Tegnér &lt;johannes@jitesoft.com&gt;&#34;,&#xA;  &#34;maintainer.org&#34;: &#34;Jitesoft&#34;,&#xA;  &#34;maintainer.org.uri&#34;: &#34;https://jitesoft.com&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-07T13:17:37Z&#34;,&#xA;  &#34;org.opencontainers.image.description&#34;: &#34;Nginx on Alpine linux&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt&#34;,&#xA;  &#34;org.opencontainers.image.vendor&#34;: &#34;Jitesoft&#34;,&#xA;  &#34;org.opencontainers.image.version&#34;: &#34;1.29.8&#34;,&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-07T13:17:37Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;,&#xA;  &#34;konflux.additional-tags&#34;: &#34;test-tag1, test-tag2&#34;&#xA;}&#xA;[2026-05-07T13:18:06,248422351+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-07T13:18:06,253333640+00:00] Add secrets&#xA;[2026-05-07T13:18:06,270318113+00:00] Run buildah build&#xA;[2026-05-07T13:18:06,271980996+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --label org.opencontainers.image.revision=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt --label build-date=2026-05-07T13:17:37Z --label org.opencontainers.image.created=2026-05-07T13:17:37Z --annotation org.opencontainers.image.revision=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt --annotation org.opencontainers.image.created=2026-05-07T13:17:37Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.96Txba -t quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a . &#xA;STEP 1/6: FROM quay.io/jitesoft/nginx:latest&#xA;STEP 2/6: ENV PORT=&#34;8080&#34;&#xA;STEP 3/6: LABEL konflux.additional-tags=&#34;test-tag1, test-tag2&#34;&#xA;STEP 4/6: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 5/6: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 6/6: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#34; &#34;org.opencontainers.image.revision&#34;=&#34;7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt&#34; &#34;build-date&#34;=&#34;2026-05-07T13:17:37Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-07T13:17:37Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;time=&#34;2026-05-07T13:18:06Z&#34; level=warning msg=&#34;HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format&#34;&#xA;--&gt; 557fb833dbd7&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1&#xA;[2026-05-07T13:18:07,158312365+00:00] Unsetting proxy&#xA;[2026-05-07T13:18:07,160336371+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289&#xA;Getting image source signatures&#xA;Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650&#xA;Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e&#xA;Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef&#xA;Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187&#xA;Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba&#xA;Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:18:07,742323320+00:00] End build&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-push: &#xA;[2026-05-07T13:18:08,487805373+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-07T13:18:13,679846126+00:00] Convert image&#xA;[2026-05-07T13:18:13,681520759+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:gh-test-custom-branch-xetniq-on-push-c8q26-build-container&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a docker://quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:gh-test-custom-branch-xetniq-on-push-c8q26-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650&#xA;Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba&#xA;Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187&#xA;Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef&#xA;Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e&#xA;Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1&#xA;Writing manifest to image destination&#xA;[2026-05-07T13:18:26,956551313+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;[retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a docker://quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;Getting image source signatures&#xA;Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650&#xA;Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e&#xA;Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba&#xA;Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187&#xA;Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef&#xA;Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1&#xA;Writing manifest to image destination&#xA;sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851fquay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-07T13:18:28,684647371+00:00] End push&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-07T13:18:29,362337995+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-07T13:18:32,682443230+00:00] End sbom-syft-generate&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-07T13:18:33,742009757+00:00] Prepare SBOM&#xA;[2026-05-07T13:18:33,836309036+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-07 13:18:45,732 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-07 13:18:46,235 [INFO] mobster.oci: Fetching manifest for quay.io/jitesoft/nginx@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289&#xA;2026-05-07 13:18:48,966 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:49,921 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:51,734 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:52,610 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:54,516 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:55,332 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:57,134 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:58,022 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-07 13:18:58,022 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-07 13:18:58,022 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-07 13:18:58,023 [INFO] mobster.log: Contextual workflow completed in 11.79s&#xA;2026-05-07 13:18:58,041 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-07T13:18:58,935892136+00:00] End prepare-sboms&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-upload-sbom: &#xA;[2026-05-07T13:18:59,525433280+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a@sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f] to [quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:sha256-bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:b1cdb14603e4834ca919cb7d834a0500ff50d45e30ea1479b72aff7652310df8&#xA;[2026-05-07T13:19:59,260463482+00:00] End upload-sbom&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | init container: prepare&#xA;2026/05/07 13:16:28 Entrypoint initialization&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | init container: place-scripts&#xA;2026/05/07 13:16:42 Decoded script /tekton/scripts/script-0-jcwzs&#xA;2026/05/07 13:16:42 Decoded script /tekton/scripts/script-1-9445h&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159810.0013266,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159810.410315,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt @ 7d3a9b3879595bb5c845acbebaab8616f94d6b1a (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159810.4103644,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778159810.4490387,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision 7d3a9b3879595bb5c845acbebaab8616f94d6b1a directly.&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;Executing: oras push --registry-config /tmp/create-oci.sh.nhAOl2/auth-0NNbGR.json quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a.git SOURCE_ARTIFACT&#xA;Uploading a5d0573fd1fd SOURCE_ARTIFACT&#xA;Uploaded  a5d0573fd1fd SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:c75be307bab7b45e40d1573b2ac9eb960623dc2e354f338fe070b7cbdd6c331b&#xA;Artifacts created&#xA;&#xA;&#xA; pod: gh-test-custom-branch-xetniq-on-push-c8q26-init-pod | init container: prepare&#xA;2026/05/07 13:16:08 Entrypoint initialization&#xA;&#xA;pod: gh-test-custom-branch-xetniq-on-push-c8q26-init-pod | container step-init: &#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-07T13:16:15Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-07T13:16:16Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-07T13:16:16Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-07T13:16:16Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj found after retrigger for component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: ResolvingTaskRef&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running&#xA;PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Completed&#xA;&lt; Exit [It] pipelineRun should eventually finish - /workspace/source/e2e-tests/tests/pac_build.go:539 @ 05/07/26 13:25:07.51 (9m54.811s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:25:07.51&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:25:07.51 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.317526075">
              <system-err>&gt; Enter [It] does not have expiration set - /workspace/source/e2e-tests/tests/pac_build.go:545 @ 05/07/26 13:25:07.511&#xA;&lt; Exit [It] does not have expiration set - /workspace/source/e2e-tests/tests/pac_build.go:545 @ 05/07/26 13:25:07.828 (317ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:25:07.828&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:25:07.829 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="120.930530717">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:560 @ 05/07/26 13:25:07.829&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /workspace/source/e2e-tests/tests/pac_build.go:560 @ 05/07/26 13:27:08.759 (2m0.93s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:08.76&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:08.76 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="0.317652748">
              <system-err>&gt; Enter [It] image repo is updated to private - /workspace/source/e2e-tests/tests/pac_build.go:590 @ 05/07/26 13:27:08.76&#xA;&lt; Exit [It] image repo is updated to private - /workspace/source/e2e-tests/tests/pac_build.go:590 @ 05/07/26 13:27:09.078 (317ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:09.078&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:09.078 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="8.127946338">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /workspace/source/e2e-tests/tests/pac_build.go:638 @ 05/07/26 13:27:09.079&#xA;&lt; Exit [BeforeAll] when the component is removed - /workspace/source/e2e-tests/tests/pac_build.go:638 @ 05/07/26 13:27:09.285 (205ms)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /workspace/source/e2e-tests/tests/pac_build.go:650 @ 05/07/26 13:27:09.285&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /workspace/source/e2e-tests/tests/pac_build.go:650 @ 05/07/26 13:27:17.206 (7.922s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:17.207&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:17.207 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Build Service E2E" status="passed" time="1.627974154">
              <system-err>&gt; Enter [It] purge PR is created successfully - /workspace/source/e2e-tests/tests/pac_build.go:666 @ 05/07/26 13:27:17.207&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /workspace/source/e2e-tests/tests/pac_build.go:666 @ 05/07/26 13:27:17.503 (296ms)&#xA;&gt; Enter [AfterAll] PaC component build - /workspace/source/e2e-tests/tests/pac_build.go:102 @ 05/07/26 13:27:17.503&#xA;&lt; Exit [AfterAll] PaC component build - /workspace/source/e2e-tests/tests/pac_build.go:102 @ 05/07/26 13:27:18.835 (1.332s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:18.835&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /workspace/source/e2e-tests/tests/pac_build.go:30 @ 05/07/26 13:27:18.835 (0s)&#xA;</system-err>
          </testcase>
      </testsuite>
  </testsuites>