go: downloading github.com/konflux-ci/build-service v0.0.0-20240611083846-2dee6cfe6fe4 go: downloading k8s.io/apimachinery v0.34.2 go: downloading github.com/konflux-ci/e2e-tests v0.0.0-20260506085906-2e394d3dcf2e go: downloading github.com/devfile/library/v2 v2.2.1-0.20230418160146-e75481b7eebd go: downloading github.com/onsi/gomega v1.39.1 go: downloading github.com/google/go-containerregistry v0.20.7 go: downloading k8s.io/api v0.34.2 go: downloading github.com/konflux-ci/release-service v0.0.0-20260127184035-c36c56a3c440 go: downloading github.com/google/go-github/v66 v66.0.0 go: downloading github.com/tektoncd/pipeline v1.7.0 go: downloading github.com/go-logr/logr v1.4.3 go: downloading github.com/konflux-ci/application-api v0.0.0-20260312190025-5154ad273e17 go: downloading golang.org/x/sys v0.42.0 go: downloading github.com/openshift-pipelines/pipelines-as-code v0.34.0 go: downloading golang.org/x/exp v0.0.0-20260312153236-7ab1446f8b90 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/openshift/api v0.0.0-20260320151444-324a1bcb9f55 go: downloading k8s.io/client-go v0.34.2 go: downloading k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 go: downloading knative.dev/pkg v0.0.0-20250424013628-d5e74d29daa3 go: downloading sigs.k8s.io/controller-runtime v0.20.2 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.17.0 go: downloading github.com/google/go-github/v45 v45.2.0 go: downloading golang.org/x/oauth2 v0.34.0 go: downloading github.com/prometheus/client_golang v1.23.2 go: downloading k8s.io/apiextensions-apiserver v0.34.2 go: downloading github.com/fatih/color v1.18.0 go: downloading github.com/go-git/go-git/v5 v5.16.5 go: downloading github.com/gobwas/glob v0.2.3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/pkg/errors v0.9.1 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/konflux-ci/operator-toolkit v0.0.0-20260312101100-d4e398191a68 go: downloading github.com/operator-framework/operator-lib v0.19.0 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/avast/retry-go/v4 v4.3.3 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading github.com/konflux-ci/image-controller v0.0.0-20240530145826-3296e4996f6f go: downloading github.com/moby/buildkit v0.12.5 go: downloading github.com/openshift/library-go v0.0.0-20220525173854-9b950a41acdc go: downloading github.com/docker/cli v29.0.3+incompatible go: downloading github.com/magefile/mage v1.14.0 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/xanzy/go-gitlab v0.114.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.2 go: downloading github.com/google/go-github/v75 v75.0.0 go: downloading go.yaml.in/yaml/v2 v2.4.4 go: downloading github.com/google/go-querystring v1.2.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/spf13/afero v1.15.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.67.5 go: downloading github.com/prometheus/procfs v0.19.2 go: downloading google.golang.org/protobuf v1.36.11 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/mattn/go-colorable v0.1.14 go: downloading github.com/mattn/go-isatty v0.0.20 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.2 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading golang.org/x/net v0.52.0 go: downloading github.com/codeready-toolchain/api v0.0.0-20231217224957-34f7cb3fcbf7 go: downloading github.com/conforma/crds/api v0.1.7 go: downloading github.com/konflux-ci/integration-service v0.0.0-20260330012634-6190adb9bbce go: downloading github.com/openshift/client-go v0.0.0-20260108185524-48f4ccfc4e13 go: downloading github.com/redhat-appstudio/jvm-build-service v0.0.0-20240126122210-0e2ee7e2e5b0 go: downloading github.com/vmware-tanzu/velero v1.17.2 go: downloading github.com/codeready-toolchain/toolchain-common v0.0.0-20220523142428-2558e76260fb go: downloading github.com/codeready-toolchain/toolchain-e2e v0.0.0-20220525131508-60876bfb99d3 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/gofri/go-github-ratelimit v1.0.3-0.20230428184158-a500e14de53f go: downloading github.com/opencontainers/image-spec v1.1.1 go: downloading oras.land/oras-go/v2 v2.5.0 go: downloading github.com/tektoncd/cli v0.43.0 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/bmatcuk/doublestar/v4 v4.7.1 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading golang.org/x/crypto v0.49.0 go: downloading codeberg.org/mvdkleijn/forgejo-sdk/forgejo/v2 v2.2.0 go: downloading golang.org/x/text v0.35.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 go: downloading k8s.io/kube-openapi v0.0.0-20260330154417-16be699c7b31 go: downloading dario.cat/mergo v1.0.2 go: downloading github.com/ProtonMail/go-crypto v1.3.0 go: downloading github.com/go-git/go-billy/v5 v5.7.0 go: downloading github.com/sergi/go-diff v1.4.0 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 go: downloading golang.org/x/time v0.15.0 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/santhosh-tekuri/jsonschema/v5 v5.3.1 go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/google/cel-go v0.26.1 go: downloading github.com/containerd/stargz-snapshotter/estargz v0.18.1 go: downloading github.com/docker/distribution v2.8.3+incompatible go: downloading github.com/google/btree v1.1.3 go: downloading github.com/go-fed/httpsig v1.1.1-0.20201223112313-55836744818e go: downloading github.com/hashicorp/go-version v1.7.0 go: downloading github.com/42wim/httpsig v1.2.3 go: downloading github.com/cyphar/filepath-securejoin v0.6.1 go: downloading github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 go: downloading github.com/pjbgf/sha1cd v0.5.0 go: downloading github.com/emirpasic/gods v1.18.1 go: downloading github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/containerd/typeurl/v2 v2.2.2 go: downloading github.com/docker/docker-credential-helpers v0.9.3 go: downloading github.com/klauspost/compress v1.18.2 go: downloading github.com/spf13/pflag v1.0.10 go: downloading golang.org/x/term v0.41.0 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading github.com/google/gnostic-models v0.7.1 go: downloading github.com/kevinburke/ssh_config v1.4.0 go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 go: downloading github.com/skeema/knownhosts v1.3.2 go: downloading github.com/xanzy/ssh-agent v0.3.3 go: downloading github.com/cloudflare/circl v1.6.3 go: downloading contrib.go.opencensus.io/exporter/prometheus v0.4.2 go: downloading contrib.go.opencensus.io/exporter/ocagent v0.7.1-0.20230502190836-7399e0f8ee5e go: downloading go.opencensus.io v0.24.0 go: downloading go.uber.org/zap v1.27.1 go: downloading google.golang.org/grpc v1.79.3 go: downloading github.com/vbatts/tar-split v0.12.2 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading github.com/docker/docker v28.5.2+incompatible go: downloading github.com/blendle/zapdriver v1.3.1 go: downloading github.com/x448/float16 v0.8.4 go: downloading gopkg.in/evanphx/json-patch.v4 v4.13.0 go: downloading github.com/prometheus/statsd_exporter v0.28.0 go: downloading github.com/census-instrumentation/opencensus-proto v0.4.1 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/api v0.262.0 go: downloading github.com/go-openapi/jsonreference v0.21.5 go: downloading github.com/go-openapi/swag v0.25.5 go: downloading github.com/emicklei/go-restful/v3 v3.13.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading cel.dev/expr v0.25.1 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260406210006-6f92a3bedf2d go: downloading github.com/go-openapi/jsonpointer v0.22.5 go: downloading github.com/klauspost/cpuid/v2 v2.3.0 go: downloading github.com/go-openapi/swag/cmdutils v0.25.5 go: downloading github.com/go-openapi/swag/conv v0.25.5 go: downloading github.com/go-openapi/swag/fileutils v0.25.5 go: downloading github.com/go-openapi/swag/jsonname v0.25.5 go: downloading github.com/go-openapi/swag/jsonutils v0.25.5 go: downloading github.com/go-openapi/swag/loading v0.25.5 go: downloading github.com/go-openapi/swag/mangling v0.25.5 go: downloading github.com/go-openapi/swag/netutils v0.25.5 go: downloading github.com/go-openapi/swag/stringutils v0.25.5 go: downloading github.com/go-openapi/swag/typeutils v0.25.5 go: downloading github.com/go-openapi/swag/yamlutils v0.25.5 go: downloading github.com/stoewer/go-strcase v1.3.1 go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.6 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260401024825-9d38bb4040a9 Running Suite: Build Service E2E - /workspace/source/e2e-tests/tests ==================================================================== Random Seed: 1778158695 Will run 64 of 157 specs Running in parallel across 5 processes SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:595 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:631 ------------------------------ SS ------------------------------ • [22.777 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:106 Timeline >> Image repository for component go-component-sjurmt in namespace build-e2e-qlxk do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component go-component-sjurmt in namespace build-e2e-qlxk do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [23.837 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:123 Timeline >> Image repository for component component-one-empr in namespace build-e2e-ghwp do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component component-one-empr in namespace build-e2e-ghwp do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [41.799 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:235 Timeline >> ReleaseAdmissionPlan data: {"Mapping":{"Components":[{"Name":"gh-multi-component-parent-zqts","Repository":"quay.io/redhat-appstudio-qe/release-repository"}]}}Image repository for component gh-multi-component-child-zqts in namespace build-e2e-elxj do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component gh-multi-component-child-zqts in namespace build-e2e-elxj do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component gh-multi-component-parent-zqts in namespace build-e2e-elxj do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [20.197 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-sjurmt [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:125 Timeline >> PipelineRun has not been created yet for the component build-e2e-qlxk/go-component-sjurmt << Timeline ------------------------------ • [0.428 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-sjurmt [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:140 ------------------------------ • [20.135 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:140 Timeline >> Image repository for component component-two-xosf in namespace build-e2e-ghwp do not have right state ('' != 'ready') yet but it has status { { } { } []}. Image repository for component component-two-xosf in namespace build-e2e-ghwp do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [0.063 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:158 Timeline >> build status annotation value: {"pac":{"state":"error","error-id":74,"error-message":"74: Access token is unrecognizable by GitHub"},"message":"done"} << Timeline ------------------------------ • [46.575 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named 'main') with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:137 Timeline >> Image repository for component gh-test-custom-default-pmpljn in namespace build-e2e-zzlj do not have right state ('' != 'ready') yet but it has status { { } { } []}. << Timeline ------------------------------ • [0.136 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:154 ------------------------------ • [20.348 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:176 Timeline >> PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq << Timeline ------------------------------ • [0.000 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:191 ------------------------------ • [0.215 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:195 Timeline >> build status annotation value: {"pac":{"state":"enabled","merge-url":"https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt/pull/1","configuration-time":"Thu, 07 May 2026 13:02:46 UTC"},"message":"done"} state: enabled mergeUrl: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt/pull/1 errId: 0 errMessage: configurationTime: Thu, 07 May 2026 13:02:46 UTC << Timeline ------------------------------ • [1.977 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:225 ------------------------------ • [0.377 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:243 ------------------------------ • [73.105 seconds] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations] /workspace/source/e2e-tests/tests/annotations.go:89 Timeline >> Image repository for component test-annotations-fgxrif in namespace build-e2e-qvcc do not have right state ('' != 'ready') yet but it has status { { } { } []}. build status annotation value: {"message":"unexpected build request: foo"} << Timeline ------------------------------ SSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:595 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:631 ------------------------------ SS ------------------------------ • [42.003 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:259 Timeline >> PipelineRun has not been created yet for the component build-e2e-elxj/gh-multi-component-parent-zqts << Timeline ------------------------------ • [40.268 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:178 Timeline >> PipelineRun has not been created yet for the component build-e2e-ghwp/component-two-xosf PipelineRun has not been created yet for the component build-e2e-ghwp/component-two-xosf << Timeline ------------------------------ • [19.256 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:249 ------------------------------ • [0.177 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:264 ------------------------------ • [1.418 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch] /workspace/source/e2e-tests/tests/pac_build.go:277 ------------------------------ • [30.857 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:327 Timeline >> Image repository for component gh-test-custom-branch-xetniq in namespace build-e2e-zzlj do not have right state ('' != 'ready') yet but it has status { { } { } []}. PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq << Timeline ------------------------------ • [0.244 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:342 ------------------------------ • [123.118 seconds] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:193 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup] /workspace/source/e2e-tests/tests/secret_lookup.go:206 ------------------------------ • [400.202 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:360 Timeline >> PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-cr48h reason: Completed << Timeline ------------------------------ • [1.125 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:365 ------------------------------ • [0.342 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:384 ------------------------------ • [0.510 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:390 Timeline >> Image tag quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:on-pr-f4bf0b999aa1af629a9b964edf64c90a4c3dc94e successfully found in Quay << Timeline ------------------------------ • [440.204 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:274 Timeline >> PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml found for Component build-e2e-elxj/gh-multi-component-parent-zqts PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Running PipelineRun gh-multi-component-parent-zqts-on-pull-request-zbrml reason: Completed << Timeline ------------------------------ • [0.071 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:285 Timeline >> PipelineRun gh-multi-component-child-zqts-on-pull-request-ndsxp found for Component build-e2e-elxj/gh-multi-component-child-zqts PipelineRun gh-multi-component-child-zqts-on-pull-request-ndsxp reason: Completed << Timeline ------------------------------ • [0.224 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:289 ------------------------------ • [0.465 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:416 ------------------------------ • [0.446 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:433 ------------------------------ • [2.605 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:307 Timeline >> merged result sha: 7be273d8d73b5e84bce5d8f4d10591d8610c9b17 for PR #1 << Timeline ------------------------------ • [6.284 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:318 ------------------------------ • [0.214 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:358 ------------------------------ • [2.476 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:375 Timeline >> merged result sha: b9e58c432e38be7dae0d06a7afc8a07d6edc8180 for PR #1 << Timeline ------------------------------ • [20.959 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:458 Timeline >> created file sha: b5979408ea4faa7b4ddf98a4961decd823823c58 PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq << Timeline ------------------------------ • [0.215 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:473 ------------------------------ • [20.206 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:385 Timeline >> Push PipelineRun has not been created yet for the component build-e2e-elxj/gh-multi-component-parent-zqts << Timeline ------------------------------ • [220.501 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:492 Timeline >> PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Running PipelineRun gh-test-custom-branch-xetniq-on-pull-request-tcp7z reason: Completed << Timeline ------------------------------ • [0.457 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:497 ------------------------------ • [22.937 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:523 Timeline >> merged result sha: 7d3a9b3879595bb5c845acbebaab8616f94d6b1a PipelineRun has not been created yet for the component build-e2e-zzlj/gh-test-custom-branch-xetniq << Timeline ------------------------------ • [360.222 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component is successful [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:401 Timeline >> PipelineRun gh-multi-component-parent-zqts-on-push-rtshx found for Component build-e2e-elxj/gh-multi-component-parent-zqts PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: ResolvingTaskRef PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Running PipelineRun gh-multi-component-parent-zqts-on-push-rtshx reason: Completed << Timeline ------------------------------ • [202.932 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:412 ------------------------------ • [2.169 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:429 Timeline >> merged result sha: e8de8fcd48c8f16efea046722ae51e13cd9908ae for PR #3 << Timeline ------------------------------ • [33.908 seconds] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github] /workspace/source/e2e-tests/tests/renovate.go:440 Timeline >> Verifying Dockerfile.tmp updated to sha sha256:935d6782eb8eb690e00023beaca6da3ab88eb819e931514b7e936b6809de80b4content: FROM quay.io/redhat-appstudio-qe/build-e2e-elxj/gh-multi-component-parent-zqts@sha256:935d6782eb8eb690e00023beaca6da3ab88eb819e931514b7e936b6809de80b4 RUN echo hello << Timeline ------------------------------ • [FAILED] [1156.007 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] the PipelineRun should eventually finish successfully for component go-component-sjurmt [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:159 Timeline >> PipelineRun go-component-sjurmt-on-pull-request-bqtlr found for Component build-e2e-qlxk/go-component-sjurmt PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: ResolvingTaskRef PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Running PipelineRun go-component-sjurmt-on-pull-request-bqtlr reason: Failed attempt 1/3: PipelineRun "go-component-sjurmt-on-pull-request-bqtlr" failed: pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | init container: prepare 2026/05/07 13:03:45 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | init container: place-scripts 2026/05/07 13:03:46 Decoded script /tekton/scripts/script-0-t7mnw 2026/05/07 13:03:46 Decoded script /tekton/scripts/script-1-z2s2b pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778159039.8199284,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159040.8045466,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778159040.8045993,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159040.8418798,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision 09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2 directly. pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-symlink-check: Running symlink check pod: go-component-sjurmt-on-pull-request-bqtlr-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:a17eece08b065bab33a090e04ce6c2864cb6e550cf93071eb29d3d8bac014181) Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.6YOjke/auth-FUDPnj.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2.git SOURCE_ARTIFACT Uploading a17eece08b06 SOURCE_ARTIFACT Uploaded a17eece08b06 SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-09a7d362f6c9bd32b88f4eb2e1887aa61d42dab2.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:c2c74448515b9ff3a13e9ac1a4d99b3151e68778bfece25be44174791c0a6923 Artifacts created pod: go-component-sjurmt-on-pull-request-bqtlr-init-pod | init container: prepare 2026/05/07 13:03:11 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-bqtlr-init-pod | container step-init: time="2026-05-07T13:03:36Z" level=info msg="[param] enable: false" time="2026-05-07T13:03:36Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-07T13:03:36Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-07T13:03:36Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-07T13:03:36Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-07T13:03:36Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:03:36Z" level=info msg="Cache proxy is disabled via param" time="2026-05-07T13:03:36Z" level=info msg="[result] HTTP PROXY: " time="2026-05-07T13:03:36Z" level=info msg="[result] NO PROXY: " New PipelineRun go-component-sjurmt-on-pull-request-9hp2f found after retrigger for component build-e2e-qlxk/go-component-sjurmt PipelineRun go-component-sjurmt-on-pull-request-9hp2f found for Component build-e2e-qlxk/go-component-sjurmt PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: ResolvingTaskRef PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Running PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-9hp2f reason: Failed attempt 2/3: PipelineRun "go-component-sjurmt-on-pull-request-9hp2f" failed: pod: go-component-sjurmt-on-pull-request-9hp2f-apply-tags-pod | init container: prepare 2026/05/07 13:10:51 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-apply-tags-pod | container step-apply-additional-tags: time="2026-05-07T13:10:53Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2" time="2026-05-07T13:10:53Z" level=info msg="[param] digest: sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2" time="2026-05-07T13:10:53Z" level=info msg="[param] tags-from-image-label: konflux.additional-tags" time="2026-05-07T13:10:55Z" level=warning msg="No tags given in 'konflux.additional-tags' image label" {"tags":[]} pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | init container: prepare 2026/05/07 13:07:00 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | init container: place-scripts 2026/05/07 13:07:01 Decoded script /tekton/scripts/script-1-zml85 2026/05/07 13:07:01 Decoded script /tekton/scripts/script-2-st5jx 2026/05/07 13:07:01 Decoded script /tekton/scripts/script-3-tlqhx 2026/05/07 13:07:01 Decoded script /tekton/scripts/script-4-5kmzd 2026/05/07 13:07:01 Decoded script /tekton/scripts/script-5-b2rfm pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.pftgfO/auth-W9vpyn.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-build: [2026-05-07T13:07:07,840012564+00:00] Validate context path [2026-05-07T13:07:07,845570457+00:00] Update CA trust [2026-05-07T13:07:07,847173070+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:07:10,856269062+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-07T13:07:10,914489136+00:00] Prepare system (architecture: x86_64) [2026-05-07T13:07:10,940252597+00:00] Setup prefetched Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14... Getting image source signatures Checking if image destination supports signatures Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4 Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3 Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09 Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83 Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301 Writing manifest to image destination Storing signatures [2026-05-07T13:07:30,201014887+00:00] Unsetting proxy { "architecture": "x86_64", "build-date": "2026-05-07T13:07:10Z", "com.redhat.component": "go-toolset-container", "com.redhat.license_terms": "https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI", "description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "distribution-scope": "public", "io.buildah.version": "1.42.2", "io.k8s.description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "io.k8s.display-name": "Go 1.18.9", "io.openshift.expose-services": "", "io.openshift.s2i.scripts-url": "image:///usr/libexec/s2i", "io.openshift.tags": "builder,golang,golang118,rh-golang118,go", "io.s2i.scripts-url": "image:///usr/libexec/s2i", "maintainer": "Red Hat, Inc.", "name": "rhel9/go-toolset", "release": "14", "summary": "Platform for building and running Go Applications", "url": "https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14", "vcs-ref": "7b0f81b51d2b0af1defcc8becb02629a884630a2", "vcs-type": "git", "vendor": "Red Hat, Inc.", "version": "1.18.9", "org.opencontainers.image.revision": "7b0f81b51d2b0af1defcc8becb02629a884630a2", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/sample-multi-component", "quay.expires-after": "5d", "org.opencontainers.image.created": "2026-05-07T13:07:10Z" } [2026-05-07T13:07:30,260039158+00:00] Register sub-man Adding the entitlement to the build [2026-05-07T13:07:30,265144368+00:00] Add secrets [2026-05-07T13:07:30,284717971+00:00] Run buildah build [2026-05-07T13:07:30,286451414+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=7b0f81b51d2b0af1defcc8becb02629a884630a2 --label org.opencontainers.image.revision=7b0f81b51d2b0af1defcc8becb02629a884630a2 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:07:10Z --label org.opencontainers.image.created=2026-05-07T13:07:10Z --annotation org.opencontainers.image.revision=7b0f81b51d2b0af1defcc8becb02629a884630a2 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:07:10Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.OSGz6r -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 . STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 STEP 2/10: COPY . . STEP 3/10: RUN go mod download go: no module dependencies to download STEP 4/10: RUN go build -o ./main STEP 5/10: ENV PORT 8081 STEP 6/10: EXPOSE 8081 STEP 7/10: CMD [ "./main" ] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json STEP 9/10: COPY labels.json /root/buildinfo/labels.json STEP 10/10: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="7b0f81b51d2b0af1defcc8becb02629a884630a2" "org.opencontainers.image.revision"="7b0f81b51d2b0af1defcc8becb02629a884630a2" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/sample-multi-component" "quay.expires-after"="5d" "build-date"="2026-05-07T13:07:10Z" "org.opencontainers.image.created"="2026-05-07T13:07:10Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 --> b467e20446a9 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b [2026-05-07T13:07:33,603340000+00:00] Unsetting proxy [2026-05-07T13:07:33,605369436+00:00] Add metadata Recording base image digests used registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 Getting image source signatures Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b Writing manifest to image destination [2026-05-07T13:07:43,642100126+00:00] End build pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-push: [2026-05-07T13:07:44,055787957+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:07:49,312819492+00:00] Convert image [2026-05-07T13:07:49,314527335+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-9hp2f-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-9hp2f-build-container Getting image source signatures Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b Writing manifest to image destination [2026-05-07T13:08:25,302494658+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Getting image source signatures Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:5b0b8435744b4ca2d27cd4635045db8c06b1e21196cd8c1cf9b5e49e65ab15db Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying config sha256:b467e20446a9b570b0329f2831483632c6558dcc78177a37c39ef50937931f0b Writing manifest to image destination sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-07T13:08:27,021215683+00:00] End push pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-sbom-syft-generate: [2026-05-07T13:08:27,331096344+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-07T13:08:49,454947851+00:00] End sbom-syft-generate pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-prepare-sboms: [2026-05-07T13:08:50,146912506+00:00] Prepare SBOM [2026-05-07T13:08:50,245963230+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-07 13:09:10,847 [INFO] mobster.log: Logging level set to 20 2026-05-07 13:09:15,049 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 2026-05-07 13:09:18,490 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:19,388 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:22,592 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:23,906 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:26,215 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:27,357 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:29,221 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:30,148 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:09:30,149 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-05-07 13:09:30,149 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-07 13:09:30,152 [INFO] mobster.log: Contextual workflow completed in 16.10s 2026-05-07 13:09:31,355 [INFO] mobster.main: Exiting with code 0. [2026-05-07T13:09:32,350505482+00:00] End prepare-sboms pod: go-component-sjurmt-on-pull-request-9hp2f-build-container-pod | container step-upload-sbom: [2026-05-07T13:09:32,677529447+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:cccab370360b3b8f17aad765afca0eccd896b0e44d31f26575b576fd5067d247 [2026-05-07T13:10:11,763734233+00:00] End upload-sbom pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | init container: prepare 2026/05/07 13:10:27 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | init container: place-scripts 2026/05/07 13:10:29 Decoded script /tekton/scripts/script-0-j7b7h 2026/05/07 13:10:29 Decoded script /tekton/scripts/script-1-5cl4r 2026/05/07 13:10:29 Decoded script /tekton/scripts/script-2-8x4mz pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-build: [2026-05-07T13:10:32,986324527+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Running konflux-build-cli time="2026-05-07T13:10:35Z" level=info msg="[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2" time="2026-05-07T13:10:35Z" level=info msg="[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2]" time="2026-05-07T13:10:35Z" level=info msg="[param] buildah-format: docker" time="2026-05-07T13:10:35Z" level=info msg="[param] always-build-index: false" time="2026-05-07T13:10:35Z" level=info msg="[param] additional-tags: [go-component-sjurmt-on-pull-request-9hp2f-build-image-index]" time="2026-05-07T13:10:35Z" level=info msg="[param] output-manifest-path: /index-build-data/manifest_data.json" time="2026-05-07T13:10:35Z" level=info msg="[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST" time="2026-05-07T13:10:35Z" level=info msg="[param] result-path-image-url: /tekton/results/IMAGE_URL" time="2026-05-07T13:10:35Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-07T13:10:35Z" level=info msg="[param] result-path-images: /tekton/results/IMAGES" time="2026-05-07T13:10:35Z" level=info msg="Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2" time="2026-05-07T13:10:35Z" level=info msg="buildah [stdout] f1fc3abb75e7c51bf72a2e84115a3462d7fade76eeed3da9ad2374b3a0fd4af8" logger=CliExecutor time="2026-05-07T13:10:35Z" level=info msg="Skipping image index generation. Returning results for single image." {"image_digest":"sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2","image_url":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2","image_ref":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2","images":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"} pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-create-sbom: The manifest_data.json file does not exist. Skipping the SBOM creation... pod: go-component-sjurmt-on-pull-request-9hp2f-build-image-index-pod | container step-upload-sbom: [2026-05-07T13:10:36,358885181+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' The index.spdx.json file does not exists. Skipping the SBOM upload... pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | init container: prepare 2026/05/07 13:10:41 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | init container: place-scripts 2026/05/07 13:10:43 Decoded script /tekton/scripts/script-0-shmxk 2026/05/07 13:10:43 Decoded script /tekton/scripts/script-1-fcwg8 pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | container step-extract-and-scan-image: Starting clamd ... clamd is ready! Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2. Detected container image. Processing image manifests. Running "oc image extract" on image of arch amd64 Scanning image for arch amd64. This operation may take a while. ----------- SCAN SUMMARY ----------- Infected files: 0 Time: 29.155 sec (0 m 29 s) Start Date: 2026:05:07 13:12:13 End Date: 2026:05:07 13:12:42 Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27993/Wed May 6 06:24:57 2026 Database version: 27993 [ { "filename": "/work/logs/clamscan-result-log-amd64.json", "namespace": "required_checks", "successes": 2 } ] {"timestamp":"1778159562","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1778159562","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1778159562","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "digests": ["sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"]}} pod: go-component-sjurmt-on-pull-request-9hp2f-clamav-scan-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json Preparing clamscan-result-amd64.log Preparing clamscan-ec-test-amd64.json Uploading 5feb3c68be8e clamscan-result-amd64.log Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading 2c1b4b780a30 clamscan-ec-test-amd64.json Uploaded 2c1b4b780a30 clamscan-ec-test-amd64.json Uploaded 5feb3c68be8e clamscan-result-amd64.log Uploading 23141b1a6962 application/vnd.oci.image.manifest.v1+json Uploaded 23141b1a6962 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 Digest: sha256:23141b1a69623479cc09f45c4286ca51e18c1667f844d90e1cfcec5e10fb2fd2 pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | init container: prepare 2026/05/07 13:05:33 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | init container: place-scripts 2026/05/07 13:05:36 Decoded script /tekton/scripts/script-0-m7rck 2026/05/07 13:05:36 Decoded script /tekton/scripts/script-1-zkbvm pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778159140.9397016,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159141.4959207,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/sample-multi-component @ 7b0f81b51d2b0af1defcc8becb02629a884630a2 (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778159141.4959753,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159141.5298877,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision 7b0f81b51d2b0af1defcc8becb02629a884630a2 directly. pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-symlink-check: Running symlink check pod: go-component-sjurmt-on-pull-request-9hp2f-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575) Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras push --annotation=quay.expires-after=5d --registry-config /tmp/create-oci.sh.KDSziO/auth-VPtte1.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2.git SOURCE_ARTIFACT Uploading 4ad727487fbc SOURCE_ARTIFACT Uploaded 4ad727487fbc SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:9b83a2f2f08c94c6d585bfa506efe3de4e695b1c692e1ba9b23fc4ed0c1c46d7 Artifacts created pod: go-component-sjurmt-on-pull-request-9hp2f-init-pod | init container: prepare 2026/05/07 13:05:18 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-init-pod | container step-init: time="2026-05-07T13:05:24Z" level=info msg="[param] enable: false" time="2026-05-07T13:05:24Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-07T13:05:24Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-07T13:05:24Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-07T13:05:24Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-07T13:05:24Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:05:24Z" level=info msg="Cache proxy is disabled via param" time="2026-05-07T13:05:24Z" level=info msg="[result] HTTP PROXY: " time="2026-05-07T13:05:24Z" level=info msg="[result] NO PROXY: " pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | init container: prepare 2026/05/07 13:11:01 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.FLShbX/auth-xI9xBv.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source pod: go-component-sjurmt-on-pull-request-9hp2f-push-dockerfile-pod | container step-push: time="2026-05-07T13:11:07Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2" time="2026-05-07T13:11:07Z" level=info msg="[param] image-digest: sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2" time="2026-05-07T13:11:07Z" level=info msg="[param] containerfile: docker/Dockerfile" time="2026-05-07T13:11:07Z" level=info msg="[param] context: go-component" time="2026-05-07T13:11:07Z" level=info msg="[param] tag-suffix: .dockerfile" time="2026-05-07T13:11:07Z" level=info msg="[param] artifact-type: application/vnd.konflux.dockerfile" time="2026-05-07T13:11:07Z" level=info msg="[param] source: source" time="2026-05-07T13:11:07Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-07T13:11:07Z" level=info msg="[param] alternative-filename: Dockerfile" time="2026-05-07T13:11:08Z" level=info msg="oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:b88cd3f20b75da22576693f53f642bb992c5ea0fcf4ccbf9f6a720ecaf9480f5" logger=CliExecutor time="2026-05-07T13:11:08Z" level=info msg="Containerfile '/var/workdir/source/go-component/docker/Dockerfile' is pushed to registry with tag: sha256-418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2.dockerfile" {"image_ref":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:b88cd3f20b75da22576693f53f642bb992c5ea0fcf4ccbf9f6a720ecaf9480f5"} pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | init container: prepare 2026/05/07 13:10:43 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | init container: place-scripts 2026/05/07 13:10:51 Decoded script /tekton/scripts/script-1-xlqwl 2026/05/07 13:10:51 Decoded script /tekton/scripts/script-2-q4ksj pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.GTdtBO/auth-6ClKWN.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-sast-shell-check: + source /utils.sh ++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache ++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index + trap 'handle_error /tekton/results/TEST_OUTPUT' EXIT + [[ -z '' ]] + PROJECT_NAME=go-component-sjurmt INFO: The PROJECT_NAME used is: go-component-sjurmt + echo 'INFO: The PROJECT_NAME used is: go-component-sjurmt' + ca_bundle=/mnt/trusted-ca/ca-bundle.crt + '[' -f /mnt/trusted-ca/ca-bundle.crt ']' + echo 'INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt' + cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' + update-ca-trust ++ rpm -q --queryformat '%{NAME}-%{VERSION}-%{RELEASE}\n' ShellCheck + PACKAGE_VERSION=ShellCheck-0.10.0-3.el9 + OUTPUT_FILE=shellcheck-results.json + SOURCE_CODE_DIR=/var/workdir/source + declare -a ALL_TARGETS + IFS=, + read -ra TARGET_ARRAY + for d in "${TARGET_ARRAY[@]}" + potential_path=/var/workdir/source/. ++ realpath -m /var/workdir/source/. + resolved_path=/var/workdir/source + [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]] + ALL_TARGETS+=("$resolved_path") + '[' -z '' ']' + '[' -r /sys/fs/cgroup/cpu.max ']' + read -r quota period + '[' 800000 '!=' max ']' + '[' -n 100000 ']' + '[' 100000 -gt 0 ']' + export SC_JOBS=8 + SC_JOBS=8 + echo 'INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh' + /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh Looking for shell scripts................ done + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample + timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample + CSGREP_OPTS=(--mode=json --strip-path-prefix="$SOURCE_CODE_DIR"/ --remove-duplicates --embed-context=3 --set-scan-prop="ShellCheck:${PACKAGE_VERSION}") + [[ true == \t\r\u\e ]] + CSGREP_EVENT_FILTER='\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|' + CSGREP_EVENT_FILTER+='2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|' + CSGREP_EVENT_FILTER+='2218|2224|2225|2242|2256|2258|2261)\]$' + CSGREP_OPTS+=(--event="$CSGREP_EVENT_FILTER") + csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 '--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$' ./shellcheck-results/empty.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-129.json ./shellcheck-results/sc-130.json ./shellcheck-results/sc-133.json ./shellcheck-results/sc-84.json ./shellcheck-results/sc-87.json ./shellcheck-results/sc-89.json ./shellcheck-results/sc-91.json ./shellcheck-results/sc-95.json ./shellcheck-results/sc-98.json + [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]] + KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git + PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives + KFP_DIR=known-false-positives + KFP_CLONED=0 + mkdir known-false-positives + [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]] + echo -n 'INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... ' + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives ++ head -1 curl: (6) Could not resolve host: gitlab.cee.redhat.com + [[ 0 -eq 0 ]] + echo 'WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered' + echo 'ShellCheck results have been saved to shellcheck-results.json' INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered ShellCheck results have been saved to shellcheck-results.json + csgrep --mode=evtstat shellcheck-results.json + csgrep --mode=sarif shellcheck-results.json + TEST_OUTPUT= + parse_test_output sast-shell-check-oci-ta sarif shellcheck-results.sarif + TEST_NAME=sast-shell-check-oci-ta + TEST_RESULT_FORMAT=sarif + TEST_RESULT_FILE=shellcheck-results.sarif + '[' -z sast-shell-check-oci-ta ']' + '[' -z sarif ']' + '[' -z shellcheck-results.sarif ']' + '[' '!' -f shellcheck-results.sarif ']' + '[' sarif = sarif ']' +++ jq -rce '(if (.runs[].results | length > 0) then "FAILURE" else "SUCCESS" end)' shellcheck-results.sarif +++ jq -rce '(.runs[].results | length)' shellcheck-results.sarif ++ make_result_json -r SUCCESS -f 0 ++ local RESULT= ++ local SUCCESSES=0 ++ local FAILURES=0 ++ local WARNINGS=0 ++ local 'NOTE=For details, check Tekton task log.' ++ local NAMESPACE=default ++ local OUTPUT ++ local OPTIND opt ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ RESULT=SUCCESS ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ FAILURES=0 ++ getopts :r:s:f:w:t:n: opt ++ shift 4 ++ '[' -z SUCCESS ']' ++ case "${RESULT}" in ++++ date -u --iso-8601=seconds +++ jq -rce --arg date 2026-05-07T13:10:55+00:00 --arg result SUCCESS --arg note 'For details, check Tekton task log.' --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input '{ result: $result, timestamp: $date, note: $note, namespace: $namespace, successes: $successes|tonumber, failures: $failures|tonumber, warnings: $warnings|tonumber }' ++ OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + TEST_OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ jq .failures + '[' 0 -gt 0 ']' + echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0}' + tee /tekton/results/TEST_OUTPUT {"result":"SUCCESS","timestamp":"2026-05-07T13:10:55+00:00","note":"For details, check Tekton task log.","namespace":"default","successes":0,"failures":0,"warnings":0} + handle_error /tekton/results/TEST_OUTPUT + exit_code=0 + '[' 0 -ne 0 ']' + exit 0 pod: go-component-sjurmt-on-pull-request-9hp2f-sast-shell-check-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 shellcheck-results.sarif:application/sarif+json Preparing shellcheck-results.sarif Uploading da808faebf6f shellcheck-results.sarif Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploaded da808faebf6f shellcheck-results.sarif Uploading 28c29bfb38c3 application/vnd.oci.image.manifest.v1+json Uploaded 28c29bfb38c3 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 Digest: sha256:28c29bfb38c3d6269fd56b3aa371eb7b5eecae1c2a127af88df7a878ec6908f6 No excluded-findings.json exists. Skipping upload. pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | init container: prepare 2026/05/07 13:10:41 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | init container: place-scripts 2026/05/07 13:10:43 Decoded script /tekton/scripts/script-1-9htc9 2026/05/07 13:10:43 Decoded script /tekton/scripts/script-2-9k54q pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.BRESG1/auth-Ce5qg6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-sast-snyk-check: INFO: The PROJECT_NAME used is: go-component-sjurmt INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' {"result":"SKIPPED","timestamp":"2026-05-07T13:11:07+00:00","note":"Task sast-snyk-check-oci-ta skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key 'snyk_token' containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)","namespace":"default","successes":0,"failures":0,"warnings":0} pod: go-component-sjurmt-on-pull-request-9hp2f-sast-snyk-check-pod | container step-upload: No sast_snyk_check_out.sarif exists. Skipping upload. No excluded-findings.json exists. Skipping upload. pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | init container: prepare 2026/05/07 13:11:01 Entrypoint initialization pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | init container: place-scripts 2026/05/07 13:11:03 Decoded script /tekton/scripts/script-0-r5xk6 2026/05/07 13:11:03 Decoded script /tekton/scripts/script-1-j4r6h pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | container step-rpms-signature-scan: + set -o pipefail + rpm_verifier --image-url quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 --image-digest sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 --workdir /tmp Image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 No unsigned RPMs found {'keys': {'199e2f91fd431d51': 419, 'unsigned': 0}} ==================================== Final results: {"keys": {"199e2f91fd431d51": 419, "unsigned": 0}} Images processed: {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "digests": ["sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"]}} pod: go-component-sjurmt-on-pull0a658e1fd8a048e451d2839b1121bc5d-pod | container step-output-results: + source /utils.sh ++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache ++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index ++ cat /tmp/status + status=SUCCESS ++ cat /tmp/results + rpms_data='{"keys": {"199e2f91fd431d51": 419, "unsigned": 0}}' ++ cat /tmp/images_processed + images_processed='{"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "digests": ["sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"]}}' + '[' SUCCESS == ERROR ']' + note='Task rpms-signature-scan completed successfully' ++ make_result_json -r SUCCESS -t 'Task rpms-signature-scan completed successfully' ++ local RESULT= ++ local SUCCESSES=0 ++ local FAILURES=0 ++ local WARNINGS=0 ++ local 'NOTE=For details, check Tekton task log.' ++ local NAMESPACE=default ++ local OUTPUT ++ local OPTIND opt ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ RESULT=SUCCESS ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ NOTE='Task rpms-signature-scan completed successfully' ++ getopts :r:s:f:w:t:n: opt ++ shift 4 ++ '[' -z SUCCESS ']' ++ case "${RESULT}" in ++++ date -u --iso-8601=seconds +++ jq -rce --arg date 2026-05-07T13:12:20+00:00 --arg result SUCCESS --arg note 'Task rpms-signature-scan completed successfully' --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input '{ result: $result, timestamp: $date, note: $note, namespace: $namespace, successes: $successes|tonumber, failures: $failures|tonumber, warnings: $warnings|tonumber }' ++ OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:12:20+00:00","note":"Task rpms-signature-scan completed successfully","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:12:20+00:00","note":"Task rpms-signature-scan completed successfully","namespace":"default","successes":0,"failures":0,"warnings":0}' + TEST_OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:12:20+00:00","note":"Task rpms-signature-scan completed successfully","namespace":"default","successes":0,"failures":0,"warnings":0}' + echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:12:20+00:00","note":"Task rpms-signature-scan completed successfully","namespace":"default","successes":0,"failures":0,"warnings":0}' + tee /tekton/results/TEST_OUTPUT {"result":"SUCCESS","timestamp":"2026-05-07T13:12:20+00:00","note":"Task rpms-signature-scan completed successfully","namespace":"default","successes":0,"failures":0,"warnings":0} + echo '{"keys": {"199e2f91fd431d51": 419, "unsigned": 0}}' + tee /tekton/results/RPMS_DATA {"keys": {"199e2f91fd431d51": 419, "unsigned": 0}} + echo '{"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "digests": ["sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"]}}' + tee /tekton/results/IMAGES_PROCESSED {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "digests": ["sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2"]}} pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | init container: prepare 2026/05/07 13:10:41 Entrypoint initialization pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | init container: place-scripts 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-0-6scm5 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-1-cqm5m 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-2-zd6gl 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-3-tgbnw 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-4-rxd28 2026/05/07 13:10:42 Decoded script /tekton/scripts/script-5-v9pgn pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-introspect: Artifact type will be determined by introspection. Checking the media type of the OCI artifact... [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json. Looking for image labels that indicate this might be an operator bundle... [retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Found 0 matching labels. Expecting 3 or more to identify this image as an operator bundle. Introspection concludes that this artifact is of type "application". pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-generate-container-auth: Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Auth json written to "/auth/auth.json". pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-set-skip-for-bundles: 2026/05/07 13:11:07 INFO Step was skipped due to when expressions were evaluated to false. pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-app-check: time="2026-05-07T13:11:07Z" level=info msg="certification library version" version="1.17.2 " time="2026-05-07T13:11:08Z" level=info msg="running checks for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 for platform amd64" time="2026-05-07T13:11:08Z" level=info msg="target image" image="quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2" time="2026-05-07T13:12:23Z" level=info msg="warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1652724893/fs/licenses: no such file or directory" check=HasLicense time="2026-05-07T13:12:23Z" level=info msg="check completed" check=HasLicense result=FAILED time="2026-05-07T13:12:23Z" level=info msg="check completed" check=HasUniqueTag result=PASSED time="2026-05-07T13:12:23Z" level=info msg="check completed" check=LayerCountAcceptable result=PASSED time="2026-05-07T13:12:23Z" level=info msg="check completed" check=HasNoProhibitedPackages result=PASSED time="2026-05-07T13:12:23Z" level=info msg="check completed" check=HasRequiredLabel result=PASSED time="2026-05-07T13:12:23Z" level=info msg="USER 1001 specified that is non-root" check=RunAsNonRoot time="2026-05-07T13:12:23Z" level=info msg="check completed" check=RunAsNonRoot result=PASSED time="2026-05-07T13:12:46Z" level=info msg="check completed" check=HasModifiedFiles result=PASSED time="2026-05-07T13:12:46Z" level=info msg="check completed" check=BasedOnUbi result=PASSED time="2026-05-07T13:12:47Z" level=info msg="This image's tag on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 will be paired with digest sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit." { "image": "quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2", "passed": false, "test_library": { "name": "github.com/redhat-openshift-ecosystem/openshift-preflight", "version": "1.17.2", "commit": "eb87e5b2d67ad110a0afe8edfb16f445e0877c4e" }, "results": { "passed": [ { time="2026-05-07T13:12:47Z" level=info msg="Preflight result: FAILED" "name": "HasUniqueTag", "elapsed_time": 0, "description": "Checking if container has a tag other than 'latest', so that the image can be uniquely identified." }, { "name": "LayerCountAcceptable", "elapsed_time": 0, "description": "Checking if container has less than 40 layers. Too many layers within the container images can degrade container performance." }, { "name": "HasNoProhibitedPackages", "elapsed_time": 120, "description": "Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages." }, { "name": "HasRequiredLabel", "elapsed_time": 0, "description": "Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata" }, { "name": "RunAsNonRoot", "elapsed_time": 0, "description": "Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication" }, { "name": "HasModifiedFiles", "elapsed_time": 22673, "description": "Checks that no files installed via RPM in the base Red Hat layer have been modified" }, { "name": "BasedOnUbi", "elapsed_time": 947, "description": "Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)" } ], "failed": [ { "name": "HasLicense", "elapsed_time": 0, "description": "Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses", "help": "Check HasLicense encountered an error. Please review the preflight.log file for more information.", "suggestion": "Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.", "knowledgebase_url": "https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction", "check_url": "https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction" } ], "errors": [] } } pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-app-set-outcome: [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 {"result":"FAILURE","timestamp":"1778159568","note":"Task preflight is a FAILURE: Refer to Tekton task logs for more information","successes":7,"failures":1,"warnings":0} pod: go-component-sjurmt-on-pulladad546ac12f8fd962ef71a266165374-pod | container step-final-outcome: + [[ ! -f /mount/konflux.results.json ]] + tee /tekton/steps/step-final-outcome/results/test-output {"result":"FAILURE","timestamp":"1778159568","note":"Task preflight is a FAILURE: Refer to Tekton task logs for more information","successes":7,"failures":1,"warnings":0} pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | init container: prepare 2026/05/07 13:10:51 Entrypoint initialization pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | init container: place-scripts 2026/05/07 13:10:52 Decoded script /tekton/scripts/script-1-btb7w 2026/05/07 13:10:52 Decoded script /tekton/scripts/script-2-48tsl pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.keR7N1/auth-zZhhye.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:4ad727487fbcc01fbe0449a7534e2c57925d6ae4b56bdd5f5f29a479a1bce575 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-sast-unicode-check: + . /utils.sh ++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache ++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index + trap 'handle_error /tekton/results/TEST_OUTPUT' EXIT + [[ -z '' ]] + PROJECT_NAME=go-component-sjurmt + echo 'INFO: The PROJECT_NAME used is: go-component-sjurmt' + ca_bundle=/mnt/trusted-ca/ca-bundle.crt + '[' -f /mnt/trusted-ca/ca-bundle.crt ']' INFO: The PROJECT_NAME used is: go-component-sjurmt INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt + echo 'INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt' + cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' + update-ca-trust + SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 + FUC_EXIT_CODE=0 + declare -a ALL_TARGETS + OLD_IFS=' ' + IFS=, + for d in $TARGET_DIRS + ALL_TARGETS+=("${SOURCE_CODE_DIR}/source/${d}") + IFS=' ' + LANG=en_US.utf8 + find_unicode_control.py -p bidi -v -d -t /var/workdir/source/. + [[ 0 -ne 0 ]] + sed -i raw_sast_unicode_check_out.txt -E -e 's|(.*:[0-9]+)(.*)|\1: warning:\2|' -e 's|^|Error: UNICONTROL_WARNING:\n|' + CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop="${SCAN_PROP}" --strip-path-prefix="${SOURCE_CODE_DIR}"/source/) + csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt + csgrep --mode=evtstat processed_sast_unicode_check_out.json + [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]] + KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git + PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives + KFP_DIR=known-false-positives + KFP_CLONED=0 + mkdir known-false-positives + [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]] + echo -n 'INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... ' + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives ++ head -1 curl: (6) Could not resolve host: gitlab.cee.redhat.com INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered + [[ 0 -eq 0 ]] + echo 'WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered' + mv processed_sast_unicode_check_out.json sast_unicode_check_out.json + csgrep --mode=sarif sast_unicode_check_out.json + [[ 0 -eq 0 ]] + note='Task sast-unicode-check-oci-ta success: No finding was detected' ++ make_result_json -r SUCCESS -t 'Task sast-unicode-check-oci-ta success: No finding was detected' ++ local RESULT= ++ local SUCCESSES=0 ++ local FAILURES=0 ++ local WARNINGS=0 ++ local 'NOTE=For details, check Tekton task log.' ++ local NAMESPACE=default ++ local OUTPUT ++ local OPTIND opt ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ RESULT=SUCCESS ++ getopts :r:s:f:w:t:n: opt ++ case "${opt}" in ++ NOTE='Task sast-unicode-check-oci-ta success: No finding was detected' ++ getopts :r:s:f:w:t:n: opt ++ shift 4 ++ '[' -z SUCCESS ']' ++ case "${RESULT}" in ++++ date -u --iso-8601=seconds +++ jq -rce --arg date 2026-05-07T13:10:56+00:00 --arg result SUCCESS --arg note 'Task sast-unicode-check-oci-ta success: No finding was detected' --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input '{ result: $result, timestamp: $date, note: $note, namespace: $namespace, successes: $successes|tonumber, failures: $failures|tonumber, warnings: $warnings|tonumber }' ++ OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:10:56+00:00","note":"Task sast-unicode-check-oci-ta success: No finding was detected","namespace":"default","successes":0,"failures":0,"warnings":0}' ++ echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:10:56+00:00","note":"Task sast-unicode-check-oci-ta success: No finding was detected","namespace":"default","successes":0,"failures":0,"warnings":0}' + ERROR_OUTPUT='{"result":"SUCCESS","timestamp":"2026-05-07T13:10:56+00:00","note":"Task sast-unicode-check-oci-ta success: No finding was detected","namespace":"default","successes":0,"failures":0,"warnings":0}' + echo '{"result":"SUCCESS","timestamp":"2026-05-07T13:10:56+00:00","note":"Task sast-unicode-check-oci-ta success: No finding was detected","namespace":"default","successes":0,"failures":0,"warnings":0}' + tee /tekton/results/TEST_OUTPUT {"result":"SUCCESS","timestamp":"2026-05-07T13:10:56+00:00","note":"Task sast-unicode-check-oci-ta success: No finding was detected","namespace":"default","successes":0,"failures":0,"warnings":0} + handle_error /tekton/results/TEST_OUTPUT + exit_code=0 + '[' 0 -ne 0 ']' + exit 0 pod: go-component-sjurmt-on-pulle2e7081739158a3c4385e376cc3ec753-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Attaching to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 sast_unicode_check_out.sarif:application/sarif+json Preparing sast_unicode_check_out.sarif Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading 0e9806f310b4 sast_unicode_check_out.sarif Uploaded 0e9806f310b4 sast_unicode_check_out.sarif Uploading b36de1b717f3 application/vnd.oci.image.manifest.v1+json Uploaded b36de1b717f3 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-7b0f81b51d2b0af1defcc8becb02629a884630a2@sha256:418ef6df2be7154b95750ec86244b9da16ef88b4f722bc281548f138a8bab4c2 Digest: sha256:b36de1b717f3079fdf7305d8e93b3b8bd3480134e1c75286be6801dda4aa7611 No excluded-findings.json exists. Skipping upload. pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | init container: prepare 2026/05/07 13:05:51 Entrypoint initialization pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | init container: place-scripts 2026/05/07 13:06:00 Decoded script /tekton/scripts/script-0-2sfwr 2026/05/07 13:06:00 Decoded script /tekton/scripts/script-2-bqxlk pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-skip-ta: pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-use-trusted-artifact: WARN: found skip file in /var/workdir/source pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-prefetch-dependencies: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' time="2026-05-07T13:06:54Z" level=debug msg="Starting prefetch-dependencies" time="2026-05-07T13:06:54Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:06:54Z" level=info msg="Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level" logger=PrefetchDependencies time="2026-05-07T13:06:54Z" level=info msg="[param] source-dir: /var/workdir/source" time="2026-05-07T13:06:54Z" level=info msg="[param] output-dir: /var/workdir/cachi2/output" time="2026-05-07T13:06:54Z" level=info msg="[param] sbom-format: spdx" time="2026-05-07T13:06:54Z" level=info msg="[param] mode: strict" time="2026-05-07T13:06:54Z" level=info msg="[param] output-dir-mount-point: /cachi2/output" time="2026-05-07T13:06:54Z" level=info msg="[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]" time="2026-05-07T13:06:54Z" level=info msg="[param] git-auth-directory: /workspace/git-basic-auth" time="2026-05-07T13:06:57Z" level=info msg="hermeto [stdout] hermeto 0.51.0" logger=CliExecutor time="2026-05-07T13:06:57Z" level=warning msg="No input provided; skipping prefetch-dependencies" logger=PrefetchDependencies time="2026-05-07T13:06:57Z" level=debug msg="Finished prefetch-dependencies" pod: go-component-sjurmt-on-pullf04d28c3a87a34c1b966554e8663a75e-pod | container step-create-trusted-artifact: WARN: found skip file in /var/workdir/source WARN: found skip file in /var/workdir/cachi2 New PipelineRun go-component-sjurmt-on-pull-request-lzx85 found after retrigger for component build-e2e-qlxk/go-component-sjurmt PipelineRun go-component-sjurmt-on-pull-request-lzx85 found for Component build-e2e-qlxk/go-component-sjurmt PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: ResolvingTaskRef PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Running PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: PipelineRunStopping PipelineRun go-component-sjurmt-on-pull-request-lzx85 reason: Failed an error happened during storing pipelineRun log build-e2e-qlxk:go-component-sjurmt-on-pull-request-lzx85: container "place-scripts" in pod "go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod" is waiting to start: PodInitializing failed to get logs for PipelineRun build-e2e-qlxk:go-component-sjurmt-on-pull-request-lzx85: container "place-scripts" in pod "go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod" is waiting to start: PodInitializing attempt 3/3: PipelineRun "go-component-sjurmt-on-pull-request-lzx85" failed: pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare 2026/05/07 13:20:44 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: time="2026-05-07T13:20:49Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:20:49Z" level=info msg="[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef" time="2026-05-07T13:20:49Z" level=info msg="[param] tags-from-image-label: konflux.additional-tags" time="2026-05-07T13:20:51Z" level=warning msg="No tags given in 'konflux.additional-tags' image label" {"tags":[]} pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare 2026/05/07 13:14:18 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: [2026-05-07T13:14:51,584962014+00:00] Validate context path [2026-05-07T13:14:51,590303285+00:00] Update CA trust [2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64) [2026-05-07T13:14:56,951544177+00:00] Setup prefetched Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14... Getting image source signatures Checking if image destination supports signatures Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4 Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83 Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09 Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3 Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301 Writing manifest to image destination Storing signatures [2026-05-07T13:15:33,418488104+00:00] Unsetting proxy { "architecture": "x86_64", "build-date": "2026-05-07T13:14:56Z", "com.redhat.component": "go-toolset-container", "com.redhat.license_terms": "https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI", "description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "distribution-scope": "public", "io.buildah.version": "1.42.2", "io.k8s.description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "io.k8s.display-name": "Go 1.18.9", "io.openshift.expose-services": "", "io.openshift.s2i.scripts-url": "image:///usr/libexec/s2i", "io.openshift.tags": "builder,golang,golang118,rh-golang118,go", "io.s2i.scripts-url": "image:///usr/libexec/s2i", "maintainer": "Red Hat, Inc.", "name": "rhel9/go-toolset", "release": "14", "summary": "Platform for building and running Go Applications", "url": "https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14", "vcs-ref": "8be853ac5f3f626af43e0aff03810770cba4d8b8", "vcs-type": "git", "vendor": "Red Hat, Inc.", "version": "1.18.9", "org.opencontainers.image.revision": "8be853ac5f3f626af43e0aff03810770cba4d8b8", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/sample-multi-component", "quay.expires-after": "5d", "org.opencontainers.image.created": "2026-05-07T13:14:56Z" } [2026-05-07T13:15:33,484601313+00:00] Register sub-man Adding the entitlement to the build [2026-05-07T13:15:33,489717883+00:00] Add secrets [2026-05-07T13:15:33,571648026+00:00] Run buildah build [2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 STEP 2/10: COPY . . STEP 3/10: RUN go mod download go: no module dependencies to download STEP 4/10: RUN go build -o ./main STEP 5/10: ENV PORT 8081 STEP 6/10: EXPOSE 8081 STEP 7/10: CMD [ "./main" ] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json STEP 9/10: COPY labels.json /root/buildinfo/labels.json STEP 10/10: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="8be853ac5f3f626af43e0aff03810770cba4d8b8" "org.opencontainers.image.revision"="8be853ac5f3f626af43e0aff03810770cba4d8b8" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/sample-multi-component" "quay.expires-after"="5d" "build-date"="2026-05-07T13:14:56Z" "org.opencontainers.image.created"="2026-05-07T13:14:56Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 --> 6963114e8776 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb [2026-05-07T13:15:42,307519763+00:00] Unsetting proxy [2026-05-07T13:15:42,309735970+00:00] Add metadata Recording base image digests used registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination [2026-05-07T13:16:02,009262643+00:00] End build pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: [2026-05-07T13:16:02,893116313+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:16:28,482527788+00:00] Convert image [2026-05-07T13:16:28,484050620+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination [2026-05-07T13:17:08,572194317+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-07T13:17:11,300002294+00:00] End push pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: [2026-05-07T13:17:11,968884365+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: [2026-05-07T13:17:34,403794295+00:00] Prepare SBOM [2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20 2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s 2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0. [2026-05-07T13:18:04,506846248+00:00] End prepare-sboms pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: [2026-05-07T13:18:05,099117708+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285 [2026-05-07T13:18:41,291872523+00:00] End upload-sbom pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare 2026/05/07 13:19:12 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84 pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: [2026-05-07T13:19:28,080583581+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Running konflux-build-cli time="2026-05-07T13:19:31Z" level=info msg="[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:19:31Z" level=info msg="[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]" time="2026-05-07T13:19:31Z" level=info msg="[param] buildah-format: docker" time="2026-05-07T13:19:31Z" level=info msg="[param] always-build-index: false" time="2026-05-07T13:19:31Z" level=info msg="[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]" time="2026-05-07T13:19:31Z" level=info msg="[param] output-manifest-path: /index-build-data/manifest_data.json" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-url: /tekton/results/IMAGE_URL" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-images: /tekton/results/IMAGES" time="2026-05-07T13:19:31Z" level=info msg="Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:19:31Z" level=info msg="buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d" logger=CliExecutor time="2026-05-07T13:19:31Z" level=info msg="Skipping image index generation. Returning results for single image." {"image_digest":"sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef","image_url":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8","image_ref":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef","images":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef"} pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: The manifest_data.json file does not exist. Skipping the SBOM creation... pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: [2026-05-07T13:19:31,866426705+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' The index.spdx.json file does not exists. Skipping the SBOM upload... pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare 2026/05/07 13:20:28 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts [FAILED] in [It] - /workspace/source/e2e-tests/tests/multi_component.go:161 @ 05/07/26 13:22:00.319 << Timeline [FAILED] Expected success, but got an error: <*errors.errorString | 0xc0014f3eb0>: pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare 2026/05/07 13:20:44 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: time="2026-05-07T13:20:49Z" level=info msg="[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:20:49Z" level=info msg="[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef" time="2026-05-07T13:20:49Z" level=info msg="[param] tags-from-image-label: konflux.additional-tags" time="2026-05-07T13:20:51Z" level=warning msg="No tags given in 'konflux.additional-tags' image label" {"tags":[]} pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare 2026/05/07 13:14:18 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r 2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: [2026-05-07T13:14:51,584962014+00:00] Validate context path [2026-05-07T13:14:51,590303285+00:00] Update CA trust [2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64) [2026-05-07T13:14:56,951544177+00:00] Setup prefetched Trying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14... Getting image source signatures Checking if image destination supports signatures Copying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4 Copying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83 Copying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09 Copying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3 Copying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301 Writing manifest to image destination Storing signatures [2026-05-07T13:15:33,418488104+00:00] Unsetting proxy { "architecture": "x86_64", "build-date": "2026-05-07T13:14:56Z", "com.redhat.component": "go-toolset-container", "com.redhat.license_terms": "https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI", "description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "distribution-scope": "public", "io.buildah.version": "1.42.2", "io.k8s.description": "Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety features.", "io.k8s.display-name": "Go 1.18.9", "io.openshift.expose-services": "", "io.openshift.s2i.scripts-url": "image:///usr/libexec/s2i", "io.openshift.tags": "builder,golang,golang118,rh-golang118,go", "io.s2i.scripts-url": "image:///usr/libexec/s2i", "maintainer": "Red Hat, Inc.", "name": "rhel9/go-toolset", "release": "14", "summary": "Platform for building and running Go Applications", "url": "https://access.redhat.com/containers/#/registry.access.redhat.com/rhel9/go-toolset/images/1.18.9-14", "vcs-ref": "8be853ac5f3f626af43e0aff03810770cba4d8b8", "vcs-type": "git", "vendor": "Red Hat, Inc.", "version": "1.18.9", "org.opencontainers.image.revision": "8be853ac5f3f626af43e0aff03810770cba4d8b8", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/sample-multi-component", "quay.expires-after": "5d", "org.opencontainers.image.created": "2026-05-07T13:14:56Z" } [2026-05-07T13:15:33,484601313+00:00] Register sub-man Adding the entitlement to the build [2026-05-07T13:15:33,489717883+00:00] Add secrets [2026-05-07T13:15:33,571648026+00:00] Run buildah build [2026-05-07T13:15:33,573398990+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --label quay.expires-after=5d --label build-date=2026-05-07T13:14:56Z --label org.opencontainers.image.created=2026-05-07T13:14:56Z --annotation org.opencontainers.image.revision=8be853ac5f3f626af43e0aff03810770cba4d8b8 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/sample-multi-component --annotation org.opencontainers.image.created=2026-05-07T13:14:56Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.YHuEWn -t quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 . STEP 1/10: FROM registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 STEP 2/10: COPY . . STEP 3/10: RUN go mod download go: no module dependencies to download STEP 4/10: RUN go build -o ./main STEP 5/10: ENV PORT 8081 STEP 6/10: EXPOSE 8081 STEP 7/10: CMD [ "./main" ] STEP 8/10: COPY labels.json /usr/share/buildinfo/labels.json STEP 9/10: COPY labels.json /root/buildinfo/labels.json STEP 10/10: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="8be853ac5f3f626af43e0aff03810770cba4d8b8" "org.opencontainers.image.revision"="8be853ac5f3f626af43e0aff03810770cba4d8b8" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/sample-multi-component" "quay.expires-after"="5d" "build-date"="2026-05-07T13:14:56Z" "org.opencontainers.image.created"="2026-05-07T13:14:56Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 --> 6963114e8776 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb [2026-05-07T13:15:42,307519763+00:00] Unsetting proxy [2026-05-07T13:15:42,309735970+00:00] Add metadata Recording base image digests used registry.access.redhat.com/ubi9/go-toolset:1.18.9-14 registry.access.redhat.com/ubi9/go-toolset:1.18.9-14@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination [2026-05-07T13:16:02,009262643+00:00] End build pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-push: [2026-05-07T13:16:02,893116313+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:16:28,482527788+00:00] Convert image [2026-05-07T13:16:28,484050620+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:go-component-sjurmt-on-pull-request-lzx85-build-container Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination [2026-05-07T13:17:08,572194317+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 docker://quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 Getting image source signatures Copying blob sha256:d26d266df402c50b08c7065eee531f856460ed5470d2252d87e7f48e2d554fc6 Copying blob sha256:d3f6a420cbadfb30033dc481690b39191ce6d2d841ccd54434c352f474ea54c3 Copying blob sha256:db77b3de17313a3fab2620178c01a4ef8eb60cbe722a6e9390f3cbb1132a7d22 Copying blob sha256:314640f419c581ddcac8f3618af39342a4571d5dc7a4e1f5b64d60f37e630b49 Copying blob sha256:a653a5ff4eaef6037f4f354414ab251ac7218d2d42fc8326743fc63ecf2cabd5 Copying config sha256:6963114e87762c25ad487ef2c7b6d33d684ddd78fd57af0e419c7b6bfcb3a2bb Writing manifest to image destination sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478efquay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8 [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-07T13:17:11,300002294+00:00] End push pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-sbom-syft-generate: [2026-05-07T13:17:11,968884365+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-07T13:17:34,090887038+00:00] End sbom-syft-generate pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-prepare-sboms: [2026-05-07T13:17:34,403794295+00:00] Prepare SBOM [2026-05-07T13:17:34,409876742+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-07 13:17:47,509 [INFO] mobster.log: Logging level set to 20 2026-05-07 13:17:51,709 [INFO] mobster.oci: Fetching manifest for registry.access.redhat.com/ubi9/go-toolset@sha256:4e320bd8b62e406dfc567886aeab4914db125c73fe9ec308b306c72883101d51 2026-05-07 13:17:54,000 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:54,769 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:56,685 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:57,456 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:59,158 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:17:59,892 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:01,493 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:02,261 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for registry.access.redhat.com/ubi9/go-toolset@sha256:0200988bf4773dad494d97be5aeceb005da3b329fe6827c035509a3f6eec1ef1 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:02,261 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-05-07 13:18:02,262 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-07 13:18:02,264 [INFO] mobster.log: Contextual workflow completed in 11.65s 2026-05-07 13:18:03,503 [INFO] mobster.main: Exiting with code 0. [2026-05-07T13:18:04,506846248+00:00] End prepare-sboms pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-upload-sbom: [2026-05-07T13:18:05,099117708+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef] to [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:sha256-2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d4cf508690fec1ab6ba9829977d22d5038504b8a44d4763e7335ea07c4111285 [2026-05-07T13:18:41,291872523+00:00] End upload-sbom pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: prepare 2026/05/07 13:19:12 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | init container: place-scripts 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-0-7b464 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-1-tkxw7 2026/05/07 13:19:16 Decoded script /tekton/scripts/script-2-tkd84 pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-build: [2026-05-07T13:19:28,080583581+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Running konflux-build-cli time="2026-05-07T13:19:31Z" level=info msg="[param] image: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:19:31Z" level=info msg="[param] images: [quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef]" time="2026-05-07T13:19:31Z" level=info msg="[param] buildah-format: docker" time="2026-05-07T13:19:31Z" level=info msg="[param] always-build-index: false" time="2026-05-07T13:19:31Z" level=info msg="[param] additional-tags: [go-component-sjurmt-on-pull-request-lzx85-build-image-index]" time="2026-05-07T13:19:31Z" level=info msg="[param] output-manifest-path: /index-build-data/manifest_data.json" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-url: /tekton/results/IMAGE_URL" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-image-ref: /tekton/results/IMAGE_REF" time="2026-05-07T13:19:31Z" level=info msg="[param] result-path-images: /tekton/results/IMAGES" time="2026-05-07T13:19:31Z" level=info msg="Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8" time="2026-05-07T13:19:31Z" level=info msg="buildah [stdout] e3613a9e4ed2b9249cf0266361a84e931f61999c6cd69b4a5db36fa258ea2e7d" logger=CliExecutor time="2026-05-07T13:19:31Z" level=info msg="Skipping image index generation. Returning results for single image." {"image_digest":"sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef","image_url":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8","image_ref":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef","images":"quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef"} pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-create-sbom: The manifest_data.json file does not exist. Skipping the SBOM creation... pod: go-component-sjurmt-on-pull-request-lzx85-build-image-index-pod | container step-upload-sbom: [2026-05-07T13:19:31,866426705+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' The index.spdx.json file does not exists. Skipping the SBOM upload... pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: prepare 2026/05/07 13:20:28 Entrypoint initialization pod: go-component-sjurmt-on-pull-request-lzx85-clair-scan-pod | init container: place-scripts { s: "\n pod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | init container: prepare\n2026/05/07 13:20:44 Entrypoint initialization\n\npod: go-component-sjurmt-on-pull-request-lzx85-apply-tags-pod | container step-apply-additional-tags: \ntime=\"2026-05-07T13:20:49Z\" level=info msg=\"[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt:on-pr-8be853ac5f3f626af43e0aff03810770cba4d8b8\"\ntime=\"2026-05-07T13:20:49Z\" level=info msg=\"[param] digest: sha256:2ba739642b461a78c59c15ee18e9ca72b71b54c6bef12852b1020fa305e478ef\"\ntime=\"2026-05-07T13:20:49Z\" level=info msg=\"[param] tags-from-image-label: konflux.additional-tags\"\ntime=\"2026-05-07T13:20:51Z\" level=warning msg=\"No tags given in 'konflux.additional-tags' image label\"\n{\"tags\":[]}\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: prepare\n2026/05/07 13:14:18 Entrypoint initialization\n\n pod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | init container: place-scripts\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-1-8fjrg\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-2-xsnl5\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-3-gnsd2\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-4-pvk8r\n2026/05/07 13:14:23 Decoded script /tekton/scripts/script-5-xgvsw\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-use-trusted-artifact: \nUsing token for quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt\nExecuting: oras blob fetch --registry-config /tmp/use-oci.sh.wvs3m8/auth-P8cTo6.json quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 --output -\nRestored artifact quay.io/redhat-appstudio-qe/build-e2e-qlxk/go-component-sjurmt@sha256:d01671a0092c253c606288d06aee81c71a05c9cc5db5b6be91c69c05e7cecc62 to /var/workdir/source\nWARN: artifact URI not provided, (given: =/var/workdir/cachi2)\n\n\npod: go-component-sjurmt-on-pull-request-lzx85-build-container-pod | container step-build: \n[2026-05-07T13:14:51,584962014+00:00] Validate context path\n[2026-05-07T13:14:51,590303285+00:00] Update CA trust\n[2026-05-07T13:14:51,591919458+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt\n'/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt'\n[2026-05-07T13:14:56,837237150+00:00] Prepare Dockerfile\nChecking if /var/workdir/cachi2/output/bom.json exists.\nCould not find prefetched sbom. No content_sets found for ICM\n[2026-05-07T13:14:56,876400297+00:00] Prepare system (architecture: x86_64)\n[2026-05-07T13:14:56,951544177+00:00] Setup prefetched\nTrying to pull registry.access.redhat.com/ubi9/go-toolset:1.18.9-14...\nGetting image source signatures\nChecking if image destination supports signatures\nCopying blob sha256:e76793d6902ad1adb19ede3d720024cf0cd8427b3ff606554a4bcafba03dddf4\nCopying blob sha256:0ab0ba77295aca9b12f463cb7198f0b8b6990b41151dbbd4e1b224fe85244b83\nCopying blob sha256:4a13c0e9217d70e608f2d5f5d3c5ffa6d9cd16908b3f83a7a97492d355d25a09\nCopying blob sha256:2a625e4afab51b49edb0e5f4ff37d8afbb20ec644ed1e68641358a6305557de3\nCopying config sha256:391a2eac28d98dc72726df1faa77db28f6899a77c91ad40f2bdad62baf041301\nWriting manifest to image destination\nStoring signatures\n[2026-05-07T13:15:33,418488104+00:00] Unsetting proxy\n{\n \"architecture\": \"x86_64\",\n \"build-date\": \"2026-05-07T13:14:56Z\",\n \"com.redhat.component\": \"go-toolset-container\",\n \"com.redhat.license_terms\": \"https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI\",\n \"description\": \"Go Toolset available as a container is a base platform for building and running various Go applications and frameworks. Go is an easy to learn, powerful, statically typed language in the C/C++ tradition with garbage collection, concurrent programming support, and memory safety fea... Gomega truncated this representation as it exceeds 'format.MaxLength'. Consider having the object provide a custom 'GomegaStringer' representation or adjust the parameters in Gomega's 'format' package. Learn more here: https://onsi.github.io/gomega/#adjusting-output In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:161 @ 05/07/26 13:22:00.319 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] merging the PR should be successful [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:164 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:164 @ 05/07/26 13:22:02.278 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:174 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:174 @ 05/07/26 13:22:02.279 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] creates component with context directory python-component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:106 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:106 @ 05/07/26 13:22:02.279 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] triggers a PipelineRun for component python-component-sstdwm [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:125 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:125 @ 05/07/26 13:22:02.28 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] should lead to a PaC PR creation for component python-component-sstdwm [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:140 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:140 @ 05/07/26 13:22:02.28 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] the PipelineRun should eventually finish successfully for component python-component-sstdwm [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:159 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:159 @ 05/07/26 13:22:02.28 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] merging the PR should be successful [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:164 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:164 @ 05/07/26 13:22:02.281 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:174 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:174 @ 05/07/26 13:22:02.281 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] only one component is changed [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:190 @ 05/07/26 13:22:02.281 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] only related pipelinerun should be triggered [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:205 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:205 @ 05/07/26 13:22:02.282 ------------------------------ S [SKIPPED] [0.000 seconds] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace [It] should fail to configure PaC for the component [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:264 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /workspace/source/e2e-tests/tests/multi_component.go:264 @ 05/07/26 13:22:02.282 ------------------------------ • [594.812 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:539 Timeline >> PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-c8q26 reason: Failed attempt 1/3: PipelineRun "gh-test-custom-branch-xetniq-on-push-c8q26" failed: pod: gh-test-custom-branch-xetniq-on-pull-request-cr48h-init-pod | init container: prepare 2026/05/07 13:04:33 Entrypoint initialization pod: gh-test-custom-branch-xetniq-on-pull-request-cr48h-init-pod | container step-init: time="2026-05-07T13:04:35Z" level=info msg="[param] enable: false" time="2026-05-07T13:04:35Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-07T13:04:35Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-07T13:04:35Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-07T13:04:35Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-07T13:04:35Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:04:35Z" level=info msg="Cache proxy is disabled via param" time="2026-05-07T13:04:35Z" level=info msg="[result] HTTP PROXY: " time="2026-05-07T13:04:35Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-xetniq-on-pull-request-tcp7z-init-pod | init container: prepare 2026/05/07 13:11:19 Entrypoint initialization pod: gh-test-custom-branch-xetniq-on-pull-request-tcp7z-init-pod | container step-init: time="2026-05-07T13:11:23Z" level=info msg="[param] enable: false" time="2026-05-07T13:11:23Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-07T13:11:23Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-07T13:11:23Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-07T13:11:23Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-07T13:11:23Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:11:23Z" level=info msg="Cache proxy is disabled via param" time="2026-05-07T13:11:23Z" level=info msg="[result] HTTP PROXY: " time="2026-05-07T13:11:23Z" level=info msg="[result] NO PROXY: " pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | init container: prepare 2026/05/07 13:17:08 Entrypoint initialization pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | init container: place-scripts 2026/05/07 13:17:15 Decoded script /tekton/scripts/script-1-nxc5p 2026/05/07 13:17:15 Decoded script /tekton/scripts/script-2-vplgn 2026/05/07 13:17:15 Decoded script /tekton/scripts/script-3-mm56j 2026/05/07 13:17:15 Decoded script /tekton/scripts/script-4-27f4s 2026/05/07 13:17:15 Decoded script /tekton/scripts/script-5-9fwww pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-use-trusted-artifact: Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq Executing: oras blob fetch --registry-config /tmp/use-oci.sh.oyQjqE/auth-qQkDqD.json quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee --output - Restored artifact quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee to /var/workdir/source WARN: artifact URI not provided, (given: =/var/workdir/cachi2) pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-build: [2026-05-07T13:17:30,305627079+00:00] Validate context path [2026-05-07T13:17:30,310602679+00:00] Update CA trust [2026-05-07T13:17:30,312633765+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:17:37,369754201+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2026-05-07T13:17:37,431670857+00:00] Prepare system (architecture: x86_64) [2026-05-07T13:17:37,538947669+00:00] Setup prefetched Trying to pull quay.io/jitesoft/nginx:latest... Getting image source signatures Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying blob sha256:c27fcb7ccfae0ffc78703910ca9ddd5a68dd0508825e673a3b9d06dd618ac0f3 Copying blob sha256:3478266b4865f4efc58d163e64670ca678ab1de9918b00b890093f6426681f7b Copying blob sha256:589002ba0eaed121a1dbf42f6648f29e5be55d5c8a6ee0f8eaa0285cc21ac153 Copying config sha256:e8566ed9bc606131964784db37d8103e708ee079caa4ef2be258acfe5e2b5033 Writing manifest to image destination [2026-05-07T13:18:06,190187774+00:00] Unsetting proxy { "com.jitesoft.app.alpine.version": "3.23.3", "com.jitesoft.app.nginx.version": "1.29.8", "com.jitesoft.build.arch": "amd64", "com.jitesoft.build.platform": "linux/amd64", "com.jitesoft.project.registry.uri": "registry.gitlab.com/jitesoft/dockerfiles/nginx", "com.jitesoft.project.repo.issues": "https://gitlab.com/jitesoft/dockerfiles/nginx/issues", "com.jitesoft.project.repo.type": "git", "com.jitesoft.project.repo.uri": "https://gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.alternative-locations": "oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.logo-url": "https://jitesoft.com/favicon-96x96.png", "io.artifacthub.package.readme-url": "https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md", "maintainer": "Johannes Tegnér ", "maintainer.org": "Jitesoft", "maintainer.org.uri": "https://jitesoft.com", "org.opencontainers.image.created": "2026-05-07T13:17:37Z", "org.opencontainers.image.description": "Nginx on Alpine linux", "org.opencontainers.image.source": "https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt", "org.opencontainers.image.vendor": "Jitesoft", "org.opencontainers.image.version": "1.29.8", "architecture": "x86_64", "vcs-type": "git", "vcs-ref": "7d3a9b3879595bb5c845acbebaab8616f94d6b1a", "org.opencontainers.image.revision": "7d3a9b3879595bb5c845acbebaab8616f94d6b1a", "build-date": "2026-05-07T13:17:37Z", "io.buildah.version": "1.42.2", "konflux.additional-tags": "test-tag1, test-tag2" } [2026-05-07T13:18:06,248422351+00:00] Register sub-man Adding the entitlement to the build [2026-05-07T13:18:06,253333640+00:00] Add secrets [2026-05-07T13:18:06,270318113+00:00] Run buildah build [2026-05-07T13:18:06,271980996+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --label org.opencontainers.image.revision=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt --label build-date=2026-05-07T13:17:37Z --label org.opencontainers.image.created=2026-05-07T13:17:37Z --annotation org.opencontainers.image.revision=7d3a9b3879595bb5c845acbebaab8616f94d6b1a --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt --annotation org.opencontainers.image.created=2026-05-07T13:17:37Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.96Txba -t quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a . STEP 1/6: FROM quay.io/jitesoft/nginx:latest STEP 2/6: ENV PORT="8080" STEP 3/6: LABEL konflux.additional-tags="test-tag1, test-tag2" STEP 4/6: COPY labels.json /usr/share/buildinfo/labels.json STEP 5/6: COPY labels.json /root/buildinfo/labels.json STEP 6/6: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="7d3a9b3879595bb5c845acbebaab8616f94d6b1a" "org.opencontainers.image.revision"="7d3a9b3879595bb5c845acbebaab8616f94d6b1a" "org.opencontainers.image.source"="https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt" "build-date"="2026-05-07T13:17:37Z" "org.opencontainers.image.created"="2026-05-07T13:17:37Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a time="2026-05-07T13:18:06Z" level=warning msg="HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format" --> 557fb833dbd7 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a 557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1 [2026-05-07T13:18:07,158312365+00:00] Unsetting proxy [2026-05-07T13:18:07,160336371+00:00] Add metadata Recording base image digests used quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289 Getting image source signatures Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650 Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1 Writing manifest to image destination [2026-05-07T13:18:07,742323320+00:00] End build pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-push: [2026-05-07T13:18:08,487805373+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2026-05-07T13:18:13,679846126+00:00] Convert image [2026-05-07T13:18:13,681520759+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:gh-test-custom-branch-xetniq-on-push-c8q26-build-container [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a docker://quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:gh-test-custom-branch-xetniq-on-push-c8q26-build-container Getting image source signatures Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650 Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1 Writing manifest to image destination [2026-05-07T13:18:26,956551313+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a [retry] executing: buildah push --format=docker --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a docker://quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a Getting image source signatures Copying blob sha256:833c374c718b51fbc5688259eb774533f0da6d0e3ce0c0b1e5ce22d57ec92650 Copying blob sha256:989e799e634906e94dc9a5ee2ee26fc92ad260522990f26e707861a5f52bf64e Copying blob sha256:5e5160618fa108259918eb014b2a1d8c629e412b3fbab733b3775221a8e137ba Copying blob sha256:b431ed29c213c3983481ebac7a73e46bc4c57aa8a883d602b321fe3da5d3e187 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying config sha256:557fb833dbd743a8355aea269b534daf362d824ddbfcc2360aa67837cc2990c1 Writing manifest to image destination sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851fquay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a [retry] executing: kubectl get configmap cluster-config -n konflux-info -o json Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap) [2026-05-07T13:18:28,684647371+00:00] End push pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-sbom-syft-generate: [2026-05-07T13:18:29,362337995+00:00] Generate SBOM Running syft on the image Running syft on the source code [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) [2026-05-07T13:18:32,682443230+00:00] End sbom-syft-generate pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-prepare-sboms: [2026-05-07T13:18:33,742009757+00:00] Prepare SBOM [2026-05-07T13:18:33,836309036+00:00] Generate SBOM with mobster Skipping SBOM validation 2026-05-07 13:18:45,732 [INFO] mobster.log: Logging level set to 20 2026-05-07 13:18:46,235 [INFO] mobster.oci: Fetching manifest for quay.io/jitesoft/nginx@sha256:b6f74d18d53ff23b0aa833041c9515de914f4c0e7498ffd566862033cd9b9289 2026-05-07 13:18:48,966 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:49,921 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:51,734 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:52,610 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:54,516 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:55,332 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:57,134 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:58,022 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/jitesoft/nginx@sha256:4d7226dc64d77bdb639adb0138c7bf9b01e85bb72175bdd3d0f97f56f335cfe2 with output b'Error: found no attestations\nerror during command execution: found no attestations\n' 2026-05-07 13:18:58,022 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won't be used, there is no parent image SBOM. 2026-05-07 13:18:58,022 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully. 2026-05-07 13:18:58,023 [INFO] mobster.log: Contextual workflow completed in 11.79s 2026-05-07 13:18:58,041 [INFO] mobster.main: Exiting with code 0. [2026-05-07T13:18:58,935892136+00:00] End prepare-sboms pod: gh-test-custom-branch-xetniq-on-push-c8q26-build-container-pod | container step-upload-sbom: [2026-05-07T13:18:59,525433280+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq Pushing sbom to registry [retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a@sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate sbom.json --key '. Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f] to [quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:sha256-bf8ba65adf0fbee69e27bcb8f7f36b33551d63a6178cffdb6bec1620e545851f.sbom] with mediaType [text/spdx+json]. quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq@sha256:b1cdb14603e4834ca919cb7d834a0500ff50d45e30ea1479b72aff7652310df8 [2026-05-07T13:19:59,260463482+00:00] End upload-sbom pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | init container: prepare 2026/05/07 13:16:28 Entrypoint initialization pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | init container: place-scripts 2026/05/07 13:16:42 Decoded script /tekton/scripts/script-0-jcwzs 2026/05/07 13:16:42 Decoded script /tekton/scripts/script-1-9445h pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1778159810.0013266,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159810.410315,"caller":"git/git.go:223","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-hello-world-vyzfnt @ 7d3a9b3879595bb5c845acbebaab8616f94d6b1a (grafted, HEAD) in path /var/workdir/source"} {"level":"info","ts":1778159810.4103644,"caller":"git/git.go:394","msg":"Retrying operation (attempt 1)"} {"level":"info","ts":1778159810.4490387,"caller":"git/git.go:277","msg":"Successfully initialized and updated submodules in path /var/workdir/source"} Merge option disabled. Using checked-out revision 7d3a9b3879595bb5c845acbebaab8616f94d6b1a directly. pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-symlink-check: Running symlink check pod: gh-test-custom-branch-xetniq-on-push-c8q26-clone-repository-pod | container step-create-trusted-artifact: Prepared artifact from /var/workdir/source (sha256:a5d0573fd1fdfcbf85b0abdf4a4d4bc103ef3603f93faa6e9a9510c23f0c8fee) Using token for quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq Executing: oras push --registry-config /tmp/create-oci.sh.nhAOl2/auth-0NNbGR.json quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a.git SOURCE_ARTIFACT Uploading a5d0573fd1fd SOURCE_ARTIFACT Uploaded a5d0573fd1fd SOURCE_ARTIFACT Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-zzlj/gh-test-custom-branch-xetniq:7d3a9b3879595bb5c845acbebaab8616f94d6b1a.git ArtifactType: application/vnd.unknown.artifact.v1 Digest: sha256:c75be307bab7b45e40d1573b2ac9eb960623dc2e354f338fe070b7cbdd6c331b Artifacts created pod: gh-test-custom-branch-xetniq-on-push-c8q26-init-pod | init container: prepare 2026/05/07 13:16:08 Entrypoint initialization pod: gh-test-custom-branch-xetniq-on-push-c8q26-init-pod | container step-init: time="2026-05-07T13:16:15Z" level=info msg="[param] enable: false" time="2026-05-07T13:16:15Z" level=info msg="[param] default-http-proxy: squid.caching.svc.cluster.local:3128" time="2026-05-07T13:16:15Z" level=info msg="[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai" time="2026-05-07T13:16:15Z" level=info msg="[param] http-proxy-result-path: /tekton/results/http-proxy" time="2026-05-07T13:16:15Z" level=info msg="[param] no-proxy-result-path: /tekton/results/no-proxy" time="2026-05-07T13:16:15Z" level=info msg="Using in-cluster config" logger=KubeClient time="2026-05-07T13:16:16Z" level=info msg="Cache proxy is disabled via param" time="2026-05-07T13:16:16Z" level=info msg="[result] HTTP PROXY: " time="2026-05-07T13:16:16Z" level=info msg="[result] NO PROXY: " New PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj found after retrigger for component build-e2e-zzlj/gh-test-custom-branch-xetniq PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj found for Component build-e2e-zzlj/gh-test-custom-branch-xetniq PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: ResolvingTaskRef PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Running PipelineRun gh-test-custom-branch-xetniq-on-push-khlhj reason: Completed << Timeline ------------------------------ • [0.318 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:545 ------------------------------ • [120.931 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:560 Timeline >> waiting for one minute and expecting to not trigger a PipelineRun << Timeline ------------------------------ • [0.318 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:590 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:595 ------------------------------ P [PENDING] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:631 ------------------------------ • [8.128 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:650 ------------------------------ • [1.628 seconds] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch] /workspace/source/e2e-tests/tests/pac_build.go:666 Timeline >> Found purge PR with id: 3 << Timeline ------------------------------ [ReportAfterSuite] PASSED [360.704 seconds] [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo ------------------------------ Summarizing 1 Failure: [FAIL] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace [It] the PipelineRun should eventually finish successfully for component go-component-sjurmt [build-service, github, pac-build, multi-component] /workspace/source/e2e-tests/tests/multi_component.go:161 Ran 53 of 157 Specs in 1515.980 seconds FAIL! -- 52 Passed | 1 Failed | 7 Pending | 97 Skipped Ginkgo ran 1 suite in 29m3.52043722s Test Suite Failed