pod: gh-test-custom-branch-ruxlfx-on-pull-request-gh6bw-init-pod | init container: prepare 2025/09/11 13:29:12 Entrypoint initialization pod: gh-test-custom-branch-ruxlfx-on-pull-request-gh6bw-init-pod | init container: place-scripts 2025/09/11 13:29:13 Decoded script /tekton/scripts/script-0-lljpb pod: gh-test-custom-branch-ruxlfx-on-pull-request-gh6bw-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:on-pr-3a5353d319113bef6148e7df105ace2bc74ffb52 Determine if Image Already Exists pod: gh-test-custom-branch-ruxlfx-on-pull-request-l7bb8-init-pod | init container: prepare 2025/09/11 13:23:03 Entrypoint initialization pod: gh-test-custom-branch-ruxlfx-on-pull-request-l7bb8-init-pod | init container: place-scripts 2025/09/11 13:23:05 Decoded script /tekton/scripts/script-0-d8r5h pod: gh-test-custom-branch-ruxlfx-on-pull-request-l7bb8-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:on-pr-c451fc14609f0202d53a34a934f16923ce65eeac Determine if Image Already Exists pod: gh-test-custom-branch-ruxlfx-on-push-45rng-apply-tags-pod | init container: prepare 2025/09/11 13:37:44 Entrypoint initialization pod: gh-test-custom-branch-ruxlfx-on-push-45rng-apply-tags-pod | init container: place-scripts 2025/09/11 13:37:46 Decoded script /tekton/scripts/script-0-hg2xw 2025/09/11 13:37:46 Decoded script /tekton/scripts/script-1-cm4jn pod: gh-test-custom-branch-ruxlfx-on-push-45rng-apply-tags-pod | container step-apply-additional-tags-from-parameter: No additional tags parameter specified pod: gh-test-custom-branch-ruxlfx-on-push-45rng-apply-tags-pod | container step-apply-additional-tags-from-image-label: Applying tag test-tag1 Getting image source signatures Copying blob sha256:7ad3527e05f4a3e2d461149c0e740b412187f6b589b4a121c8380d0f97ac7afe Copying blob sha256:fe07684b16b82247c3539ed86a65ff37a76138ec25d380bd80c869a1a4c73236 Copying blob sha256:96dd388748af46d59bfb74a70b4c8b710aa6f49c1dd268be87ccdbe9ff165630 Copying blob sha256:f5e9498bd149f33b25865a182c18cf932a88939d03ccb885a883b531d7fa85e2 Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying config sha256:9a5746b59896e687a68a402591d3b7fa3ceaf7e0e7b1f4d5672e59145ca66651 Writing manifest to image destination Applying tag test-tag2 Getting image source signatures Copying blob sha256:7ad3527e05f4a3e2d461149c0e740b412187f6b589b4a121c8380d0f97ac7afe Copying blob sha256:fe07684b16b82247c3539ed86a65ff37a76138ec25d380bd80c869a1a4c73236 Copying blob sha256:96dd388748af46d59bfb74a70b4c8b710aa6f49c1dd268be87ccdbe9ff165630 Copying blob sha256:f5e9498bd149f33b25865a182c18cf932a88939d03ccb885a883b531d7fa85e2 Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying config sha256:9a5746b59896e687a68a402591d3b7fa3ceaf7e0e7b1f4d5672e59145ca66651 Writing manifest to image destination pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | init container: prepare 2025/09/11 13:35:49 Entrypoint initialization pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | init container: place-scripts 2025/09/11 13:36:13 Decoded script /tekton/scripts/script-0-2p9kv 2025/09/11 13:36:13 Decoded script /tekton/scripts/script-1-vrxpc 2025/09/11 13:36:13 Decoded script /tekton/scripts/script-2-hn689 2025/09/11 13:36:13 Decoded script /tekton/scripts/script-3-z2n8v 2025/09/11 13:36:13 Decoded script /tekton/scripts/script-4-lpks5 pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | init container: working-dir-initializer pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | container step-build: [2025-09-11T13:36:24,580566017+00:00] Validate context path [2025-09-11T13:36:24,584973829+00:00] Update CA trust [2025-09-11T13:36:24,586206749+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2025-09-11T13:36:26,179379260+00:00] Prepare Dockerfile Checking if /var/workdir/cachi2/output/bom.json exists. Could not find prefetched sbom. No content_sets found for ICM [2025-09-11T13:36:26,189381802+00:00] Prepare system (architecture: x86_64) [2025-09-11T13:36:27,556822265+00:00] Setup prefetched Trying to pull quay.io/jitesoft/nginx:latest... Getting image source signatures Copying blob sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1 Copying blob sha256:fe07684b16b82247c3539ed86a65ff37a76138ec25d380bd80c869a1a4c73236 Copying blob sha256:96dd388748af46d59bfb74a70b4c8b710aa6f49c1dd268be87ccdbe9ff165630 Copying blob sha256:f5e9498bd149f33b25865a182c18cf932a88939d03ccb885a883b531d7fa85e2 Copying config sha256:23b150c53a797c6f429b4ea4577bd7f967a73efda43e2cdfbc384904861ea07a Writing manifest to image destination { "com.jitesoft.app.alpine.version": "3.22.0", "com.jitesoft.app.nginx.version": "1.29.0", "com.jitesoft.build.arch": "amd64", "com.jitesoft.build.platform": "linux/amd64", "com.jitesoft.project.registry.uri": "registry.gitlab.com/jitesoft/dockerfiles/nginx", "com.jitesoft.project.repo.issues": "https://gitlab.com/jitesoft/dockerfiles/nginx/issues", "com.jitesoft.project.repo.type": "git", "com.jitesoft.project.repo.uri": "https://gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.alternative-locations": "oci://index.docker.io/jitesoft/nginx,oci://ghcr.io/jitesoft/nginx,oci://registry.gitlab.com/jitesoft/dockerfiles/nginx", "io.artifacthub.package.logo-url": "https://jitesoft.com/favicon-96x96.png", "io.artifacthub.package.readme-url": "https://gitlab.com/jitesoft/dockerfiles/nginx/-/raw/master/README.md", "maintainer": "Johannes Tegnér ", "maintainer.org": "Jitesoft", "maintainer.org.uri": "https://jitesoft.com", "org.opencontainers.image.created": "", "org.opencontainers.image.description": "Nginx on Alpine linux", "org.opencontainers.image.source": "https://gitlab.com/jitesoft/dockerfiles/nginx", "org.opencontainers.image.vendor": "Jitesoft", "org.opencontainers.image.version": "1.29.0", "architecture": "x86_64", "vcs-type": "git", "vcs-ref": "e6ef4fc235348b41a245f8cd04b72c0456febf93", "build-date": "2025-09-11T13:36:27Z", "io.buildah.version": "1.40.1", "konflux.additional-tags": "test-tag1, test-tag2" } [2025-09-11T13:36:31,505602883+00:00] Register sub-man Adding the entitlement to the build [2025-09-11T13:36:31,511729142+00:00] Add secrets [2025-09-11T13:36:31,544492172+00:00] Run buildah build [2025-09-11T13:36:31,546490394+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=e6ef4fc235348b41a245f8cd04b72c0456febf93 --label build-date=2025-09-11T13:36:27Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.rKnPPL -t quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 . STEP 1/5: FROM quay.io/jitesoft/nginx:latest STEP 2/5: ENV PORT="8080" STEP 3/5: LABEL konflux.additional-tags="test-tag1, test-tag2" STEP 4/5: COPY labels.json /root/buildinfo/labels.json STEP 5/5: LABEL "architecture"="x86_64" "vcs-type"="git" "vcs-ref"="e6ef4fc235348b41a245f8cd04b72c0456febf93" "build-date"="2025-09-11T13:36:27Z" COMMIT quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 time="2025-09-11T13:36:31Z" level=warning msg="HEALTHCHECK is not supported for OCI image format and will be ignored. Must use `docker` format" --> 9a5746b59896 Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 9a5746b59896e687a68a402591d3b7fa3ceaf7e0e7b1f4d5672e59145ca66651 [2025-09-11T13:36:33,110201440+00:00] Unsetting proxy [2025-09-11T13:36:33,111826557+00:00] Add metadata Recording base image digests used quay.io/jitesoft/nginx:latest quay.io/jitesoft/nginx:latest@sha256:310387a2164947d72242e08503d58e76e79f9ac46a48634ba0b44245ffab9c89 Getting image source signatures Copying blob sha256:9f3571cbf4ae3f9bebfa5d55b43911104750e80fd2b03cf2aec3be13d97d310c Copying blob sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4 Copying blob sha256:482b1bccaa656fdd253a77b42a14981a7e0d4c6cf6f76af6f69010bc50dfe631 Copying blob sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef Copying blob sha256:dc1286ac0f137358bb3f6dc47c5439ff6513bb97fd3149961f1c8669c8767312 Copying config sha256:9a5746b59896e687a68a402591d3b7fa3ceaf7e0e7b1f4d5672e59145ca66651 Writing manifest to image destination [2025-09-11T13:36:33,903372211+00:00] End build pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | container step-push: [2025-09-11T13:36:34,113039760+00:00] Update CA trust INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' [2025-09-11T13:36:35,762773227+00:00] Convert image [2025-09-11T13:36:35,764302752+00:00] Push image with unique tag Pushing to quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:gh-test-custom-branch-ruxlfx-on-push-45rng-build-container Executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 docker://quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:gh-test-custom-branch-ruxlfx-on-push-45rng-build-container [2025-09-11T13:36:40,692344219+00:00] Push image with git revision Pushing to quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 Executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 docker://quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 sha256:e6f1d6fabbb4b0b343fde1d4e09f5cde7716b621f6d74f07018dcc9177482f81quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93 [2025-09-11T13:36:42,098344576+00:00] End push pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | container step-sbom-syft-generate: [2025-09-11T13:36:42,733583734+00:00] Generate SBOM Running syft on the source directory [0000] WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal) Running syft on the image [2025-09-11T13:36:47,504424490+00:00] End sbom-syft-generate pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | container step-prepare-sboms: [2025-09-11T13:36:48,303976464+00:00] Prepare SBOM [2025-09-11T13:36:48,311422245+00:00] Generate SBOM with mobster 2025-09-11 13:36:50,642 [INFO] mobster.log: Logging level set to 20 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND LicenseRef-custom', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-aom-libs-ea5260c6dbe8a3e7', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('LicenseRef-custom', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-custom. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND LicenseRef-custom', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-aom-libs-ea5260c6dbe8a3e7', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('LicenseRef-custom', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Domain. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Public. license_expression must only use IDs from the license list or extracted licensing info, but is: LicenseRef-AND AND BSD-2-Clause AND BSD-3-Clause AND Beerware AND LicenseRef-Domain AND ISC AND LicenseRef-Public', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-libmd-0387e6ced1ad6904', element_type=, full_element=AND(LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('BSD-2-Clause', aliases=('BSD-2-Clause-NetBSD', 'BSD-2'), is_exception=False), LicenseSymbol('BSD-3-Clause', aliases=('LicenseRef-scancode-libzip',), is_exception=False), LicenseSymbol('Beerware', is_exception=False), LicenseSymbol('LicenseRef-Domain', is_exception=False), LicenseSymbol('ISC', is_exception=False), LicenseSymbol('LicenseRef-Public', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-AND. license_expression must only use IDs from the license list or extracted licensing info, but is: 0BSD AND LicenseRef-AND AND GPL-2.0-or-later AND LGPL-2.1-or-later AND LicenseRef-Public-Domain', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-xz-libs-bd7a047b03297e4b', element_type=, full_element=AND(LicenseSymbol('0BSD', is_exception=False), LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('GPL-2.0-or-later', aliases=('GPL-2.0+', 'GPL 2.0+'), is_exception=False), LicenseSymbol('LGPL-2.1-or-later', aliases=('LGPL-2.1+',), is_exception=False), LicenseSymbol('LicenseRef-Public-Domain', is_exception=False)))) 2025-09-11 13:36:50,723 [WARNING] mobster.cmd.generate.oci_image: ValidationMessage(validation_message='Unrecognized license reference: LicenseRef-Public-Domain. license_expression must only use IDs from the license list or extracted licensing info, but is: 0BSD AND LicenseRef-AND AND GPL-2.0-or-later AND LGPL-2.1-or-later AND LicenseRef-Public-Domain', context=ValidationContext(spdx_id=None, parent_id='SPDXRef-Package-apk-xz-libs-bd7a047b03297e4b', element_type=, full_element=AND(LicenseSymbol('0BSD', is_exception=False), LicenseSymbol('LicenseRef-AND', is_exception=False), LicenseSymbol('GPL-2.0-or-later', aliases=('GPL-2.0+', 'GPL 2.0+'), is_exception=False), LicenseSymbol('LGPL-2.1-or-later', aliases=('LGPL-2.1+',), is_exception=False), LicenseSymbol('LicenseRef-Public-Domain', is_exception=False)))) 2025-09-11 13:36:50,741 [INFO] mobster.main: Exiting with code 0. [2025-09-11T13:36:50,851575464+00:00] End prepare-sboms pod: gh-test-custom-branch-ruxlfx-on-push-45rng-build-container-pod | container step-upload-sbom: [2025-09-11T13:36:50,967469567+00:00] Upload SBOM INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt '/mnt/trusted-ca/ca-bundle.crt' -> '/etc/pki/ca-trust/source/anchors/ca-bundle.crt' Using token for quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx Pushing sbom to registry Executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx:e6ef4fc235348b41a245f8cd04b72c0456febf93@sha256:e6f1d6fabbb4b0b343fde1d4e09f5cde7716b621f6d74f07018dcc9177482f81 quay.io/redhat-appstudio-qe/build-e2e-rtis/gh-test-custom-branch-ruxlfx@sha256:6764f3d0888d8ed80381bc1f74adb1bf1645a4776156d7aa238422439fc85b2a [2025-09-11T13:36:54,519406811+00:00] End upload-sbom pod: gh-test-custom-branch-ruxlfx-on-push-45rng-clair-scan-pod | init container: prepare 2025/09/11 13:37:09 Entrypoint initialization pod: gh-test-custom-branch-ruxlfx-on-push-45rng-clair-scan-pod | init container: place-scripts