pod: gh-test-custom-branch-dwwrtu-on-pull-request-jsf6t-init-pod | init container: prepare 2025/09/11 14:44:12 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-pull-request-jsf6t-init-pod | init container: place-scripts 2025/09/11 14:44:17 Decoded script /tekton/scripts/script-0-mgpqg pod: gh-test-custom-branch-dwwrtu-on-pull-request-jsf6t-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:on-pr-b34cf94f8d27e5163e3abf8471dd40e0d6af7c75 Determine if Image Already Exists pod: gh-test-custom-branch-dwwrtu-on-pull-request-pqskr-init-pod | init container: prepare 2025/09/11 14:50:21 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-pull-request-pqskr-init-pod | init container: place-scripts 2025/09/11 14:50:22 Decoded script /tekton/scripts/script-0-jjt22 pod: gh-test-custom-branch-dwwrtu-on-pull-request-pqskr-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:on-pr-d0b24a11560ad9b003b3131db00c268ed07cfa96 Determine if Image Already Exists pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | init container: prepare 2025/09/11 14:54:39 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | init container: place-scripts 2025/09/11 14:54:40 Decoded script /tekton/scripts/script-0-4c8vk 2025/09/11 14:54:40 Decoded script /tekton/scripts/script-1-xhsrs 2025/09/11 14:54:40 Decoded script /tekton/scripts/script-2-9r4pg 2025/09/11 14:54:40 Decoded script /tekton/scripts/script-3-2zqn4 2025/09/11 14:54:40 Decoded script /tekton/scripts/script-4-hj4jp pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | init container: working-dir-initializer pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | container step-build: [2025-09-11T14:54:44,523552172+00:00] Validate context path [2025-09-11T14:54:44,526659015+00:00] Update CA trust [2025-09-11T14:54:44,527834179+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2025-09-11T14:54:45,601606553+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2025-09-11T14:54:45,613178120+00:00] Prepare system (architecture: x86_64) [2025-09-11T14:54:55,663506253+00:00] Setup prefetched Trying to pull quay.io/jitesoft/nginx:latest... Getting image source signatures Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying blob sha256:fe07684b16b82247c3539ed86a65ff37a76138ec25d380bd80c869a1a4c73236 Copying blob sha256:96dd388748af46d59bfb74a70b4c8b710aa6f49c1dd268be87ccdbe9ff165630 Copying blob sha256:f5e9498bd149f33b25865a182c18cf932a88939d03ccb885a883b531d7fa85e2 Copying config sha256:23b150c53a797c6f429b4ea4577bd7f967a73efda43e2cdfbc384904861ea07a Writing manifest to image destination { "com.jitesoft.app.alpine.version": "3.22.0", "com.jitesoft.app.nginx.version": "1.29.0", "com.jitesoft.build.arch": "amd64", "com.jitesoft.build.platform": "linux/amd64", "com.jitesoft.project.registry.uri": "registry.gitlab.com/jitesoft/dockerfiles/nginx", "com.jitesoft.project.repo.issues": "https://gitlab.com/jitesoft/dockerfiles/nginx/issues", "com.jitesoft.project.repo.type": "git", "com.jitesoft.project.repo.uri": "https://gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.alternative-locations": "oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.logo-url": "https://jitesoft.com/favicon-96x96.png", "io.artifacthub.package.readme-url": "https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md", "maintainer": "Johannes Tegnér ", "maintainer.org": "Jitesoft", "maintainer.org.uri": "https://jitesoft.com", "org.opencontainers.image.created": "", "org.opencontainers.image.description": "Nginx on Alpine linux", "org.opencontainers.image.source": "https://gitlab.com/jitesoft/dockerfiles/nginx", "org.opencontainers.image.vendor": "Jitesoft", "org.opencontainers.image.version": "1.29.0", "architecture": "x86_64", "vcs-type": "git", "vcs-ref": "4284482ba219ec36133a96ac5002918ade2c4595", "build-date": "2025-09-11T14:54:55Z", "io.buildah.version": "1.40.1", "konflux.additional-tags": "test-tag1, test-tag2" } [2025-09-11T14:54:58,145834847+00:00] Register sub-man Adding the entitlement to the build [2025-09-11T14:54:58,151117046+00:00] Add secrets [2025-09-11T14:54:58,170704207+00:00] Run buildah build [2025-09-11T14:54:58,172071795+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=4284482ba219ec36133a96ac5002918ade2c4595 --label build-date=2025-09-11T14:54:55Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.4zcNZI -t quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 . STEP 1/5: FROM quay.io/jitesoft/nginx:latest STEP 2/5: ENV PORT="8080" STEP 3/5: LABEL konflux.additional-tags="test-tag1, test-tag2" STEP 4/5: COPY labels.json /root/buildinfo/labels.json STEP 5/5: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="4284482ba219ec36133a96ac5002918ade2c4595" "build-date"="2025-09-11T14:54:55Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 time="2025-09-11T14:54:58Z" level=warning msg="HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format" --> f6c55b1c5c36 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 f6c55b1c5c36377dff5ba22cc6d672958e662b83a607835191b67fcbac3bbae5 [2025-09-11T14:55:00,489346698+00:00] Unsetting proxy [2025-09-11T14:55:00,490708556+00:00] Add metadata Recording base image digests used quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:310387a2164947d72242e08503d58e76e79f9ac46a48634ba0b44245ffab9c89 Getting image source signatures Copying blob sha256:386ca952df6c822b88f10631e7463167147926c4143a53918a8a0d3c6e471dc5 Copying blob sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4 Copying blob sha256:dc1286ac0f137358bb3f6dc47c5439ff6513bb97fd3149961f1c8669c8767312 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:482b1bccaa656fdd253a77b42a14981a7e0d4c6cf6f76af6f69010bc50dfe631 Copying config sha256:f6c55b1c5c36377dff5ba22cc6d672958e662b83a607835191b67fcbac3bbae5 Writing manifest to image destination [2025-09-11T14:55:02,332098992+00:00] End build pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | container step-push: [2025-09-11T14:55:02,693195718+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2025-09-11T14:55:07,177521049+00:00] Convert image [2025-09-11T14:55:07,178624181+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container Executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 docker://quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container [2025-09-11T14:55:37,153986619+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 Executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 docker://quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 sha256:3fe7b98d53c515a1e67fa58933022276438f98598d10f521a4ad95607ac43427quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 [2025-09-11T14:55:41,027572539+00:00] End push pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | container step-sbom-syft-generate: [2025-09-11T14:55:41,887338159+00:00] Generate SBOM Running syft on the source directory [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) Running syft on the image [2025-09-11T14:55:50,464021875+00:00] End sbom-syft-generate pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | container step-prepare-sboms: [2025-09-11T14:55:51,075344126+00:00] Prepare SBOM [2025-09-11T14:55:51,081700576+00:00] Generate SBOM with mobster 2025-09-11 14:55:52,535 [INFO] mobster.log: Logging level set to 20 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND LicenseRef-custom', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-aom-libs-ea5260c6dbe8a3e7', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('LicenseRef-custom', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-custom. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND LicenseRef-custom', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-aom-libs-ea5260c6dbe8a3e7', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('LicenseRef-custom', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Domain. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Public. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: 0BSD AND LicenseRef-AND AND GPL-2.0-or-later AND LGPL-2.1-or-later AND LicenseRef-Public-Domain', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-xz-libs-bd7a047b03297e4b', element_type=, full_element=AND(LicenseSymbol('0BSD', is_exception=False), LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('GPL-2.0-or-later', aliases=('GPL-2.0+', 'GPL 2.0+'), is_exception=False), LicenseSymbol('LGPL-2.1-or-later', aliases=('LGPL-2.1+',), is_exception=False), LicenseSymbol('LicenseRef-Public-Domain', is_exception=False)))) 2025-09-11 14:55:52,585 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Public-Domain. license_expression must only use IDs from the license list or extracted licensing info, but is: 0BSD AND LicenseRef-AND AND GPL-2.0-or-later AND LGPL-2.1-or-later AND LicenseRef-Public-Domain', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-xz-libs-bd7a047b03297e4b', element_type=, full_element=AND(LicenseSymbol('0BSD', is_exception=False), LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('GPL-2.0-or-later', aliases=('GPL-2.0+', 'GPL 2.0+'), is_exception=False), LicenseSymbol('LGPL-2.1-or-later', aliases=('LGPL-2.1+',), is_exception=False), LicenseSymbol('LicenseRef-Public-Domain', is_exception=False)))) 2025-09-11 14:55:52,595 [INFO] mobster.main: Exiting with code 0. [2025-09-11T14:55:52,653850828+00:00] End prepare-sboms pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-build-container-pod | container step-upload-sbom: [2025-09-11T14:55:53,228636191+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-clone-repository-pod | init container: prepare 2025/09/11 14:54:25 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-clone-repository-pod | init container: place-scripts 2025/09/11 14:54:26 Decoded script /tekton/scripts/script-0-45h6q 2025/09/11 14:54:26 Decoded script /tekton/scripts/script-1-62gnd pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-clone-repository-pod | container step-clone: INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt {"level":"info","ts":1757602468.7900255,"caller":"git/git.go:200","msg":"Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-hello-world @ 4284482ba219ec36133a96ac5002918ade2c4595 (grafted, HEAD) in path /workspace/output/source"} {"level":"info","ts":1757602468.8319952,"caller":"git/git.go:239","msg":"Successfully initialized and updated submodules in path /workspace/output/source"} Merge option disabled. Using checked-out revision 4284482ba219ec36133a96ac5002918ade2c4595 directly. pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-clone-repository-pod | container step-symlink-check: Running symlink check pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-init-pod | init container: prepare 2025/09/11 14:54:18 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-init-pod | init container: place-scripts 2025/09/11 14:54:19 Decoded script /tekton/scripts/script-0-g9kp6 pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-agjw/gh-test-custom-branch-dwwrtu:4284482ba219ec36133a96ac5002918ade2c4595 Determine if Image Already Exists pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-show-summary-pod | init container: prepare 2025/09/11 14:56:08 Entrypoint initialization pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-show-summary-pod | init container: place-scripts 2025/09/11 14:56:09 Decoded script /tekton/scripts/script-0-8b6hb pod: gh-test-custom-branch-dwwrtu-on-push-mlwl6-show-summary-pod | container step-appstudio-summary: Build Summary: Build repository: https://github.com/redhat-appstudio-qe/devfile-sample-hello-world?rev=4284482ba219ec36133a96ac5002918ade2c4595 End Summary