<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="469" disabled="444" errors="0" failures="0" time="1386.465420158">
      <testsuite name="Red Hat App Studio E2E tests" package="/tmp/tmp.65zYiiyd8W/cmd" tests="469" disabled="82" skipped="362" errors="0" failures="0" time="1386.465420158" timestamp="2026-05-12T10:36:39">
          <properties>
              <property name="SuiteSucceeded" value="true"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value=""></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1778580324"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value=""></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value="tests/build/build_templates.go"></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="false"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="20"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="70.109670228">
              <system-err>&gt; Enter [BeforeAll] HACBS pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:237 @ 05/12/26 10:36:40.137&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778582202-tjby -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-fttg, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-jgxisj, pacBranchName: konflux-test-comp-fttg&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778582214-opcs -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-jerp, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-vxelfj, pacBranchName: konflux-test-comp-jerp&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1778582227-dvpn -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-zsrs, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-tpdimd, pacBranchName: konflux-test-comp-zsrs&#xA;Image repository for component test-symlink-comp-cnrr in namespace build-e2e-tgct do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-symlink-comp-cnrr, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-xkxzzh, pacBranchName: konflux-test-symlink-comp-cnrr&#xA;&lt; Exit [BeforeAll] HACBS pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:237 @ 05/12/26 10:37:30.056 (49.919s)&#xA;&gt; Enter [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:325 @ 05/12/26 10:37:30.057&#xA;PipelineRun has not been created yet for Component build-e2e-tgct/test-symlink-comp-cnrr&#xA;&lt; Exit [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:325 @ 05/12/26 10:37:50.149 (20.093s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.149&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.15 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.066375053">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.15&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.216 (66ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.216&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.216 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.067732312">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.217&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.284 (67ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.284&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.284 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.068856337">
              <system-err>&gt; Enter [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.285&#xA;&lt; Exit [It] scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:338 @ 05/12/26 10:37:50.353 (69ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.354&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:37:50.354 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="794.023082835">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:37:50.354&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc found for Component build-e2e-tgct/test-comp-fttg&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: PipelineRunStopping&#xA;PipelineRun test-comp-fttg-on-pull-request-r2plc reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-fttg-on-pull-request-r2plc&#34; failed: &#xA; pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | init container: prepare&#xA;2026/05/12 10:38:32 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | init container: place-scripts&#xA;2026/05/12 10:38:33 Decoded script /tekton/scripts/script-1-2nzwg&#xA;2026/05/12 10:38:33 Decoded script /tekton/scripts/script-2-lbppn&#xA;2026/05/12 10:38:33 Decoded script /tekton/scripts/script-3-zq5wt&#xA;2026/05/12 10:38:33 Decoded script /tekton/scripts/script-4-2dbkd&#xA;2026/05/12 10:38:33 Decoded script /tekton/scripts/script-5-4zmwv&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.4vQPZ3/auth-h0fULD.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-build: &#xA;[2026-05-12T10:38:37,552942326+00:00] Validate context path&#xA;[2026-05-12T10:38:37,556116679+00:00] Update CA trust&#xA;[2026-05-12T10:38:37,557177011+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:38:41,488596931+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-12T10:38:41,494143184+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-12T10:38:41,627333488+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:06,796713932+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-12T10:38:41Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-12T10:38:41Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-05-12T10:39:06,869132713+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-12T10:39:06,872195024+00:00] Add secrets&#xA;[2026-05-12T10:39:06,879204512+00:00] Run buildah build&#xA;[2026-05-12T10:39:06,880221647+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=c4c935f8923d9a47d509406e03eeb97fdf41e7c4 --label org.opencontainers.image.revision=c4c935f8923d9a47d509406e03eeb97fdf41e7c4 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-05-12T10:38:41Z --label org.opencontainers.image.created=2026-05-12T10:38:41Z --annotation org.opencontainers.image.revision=c4c935f8923d9a47d509406e03eeb97fdf41e7c4 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-05-12T10:38:41Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.2qlR48 -t quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4 . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 15.3 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 78.7 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 133.0 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.3-py3-none-any.whl (110 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 110.5/110.5 kB 122.2 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.3 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.1.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34; &#34;org.opencontainers.image.revision&#34;=&#34;c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-12T10:38:41Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-12T10:38:41Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;--&gt; 7c455bbc0355&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;7c455bbc0355a2e2f98c9af3281a7f58032707cae89a67ad6602570fe01f9b6f&#xA;[2026-05-12T10:39:13,210118373+00:00] Unsetting proxy&#xA;[2026-05-12T10:39:13,211361982+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:1fb8e55861a24a229dbd7125ef96fceacc4e19feb6f79ce75c2f6171630ca18d&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying config sha256:7c455bbc0355a2e2f98c9af3281a7f58032707cae89a67ad6602570fe01f9b6f&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:19,115131616+00:00] End build&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-push: &#xA;[2026-05-12T10:39:19,853992262+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:39:40,958169731+00:00] Convert image&#xA;[2026-05-12T10:39:40,959206981+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:test-comp-fttg-on-pull-request-r2plc-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:test-comp-fttg-on-pull-request-r2plc-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:1fb8e55861a24a229dbd7125ef96fceacc4e19feb6f79ce75c2f6171630ca18d&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying config sha256:7c455bbc0355a2e2f98c9af3281a7f58032707cae89a67ad6602570fe01f9b6f&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:49,289272778+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;Getting image source signatures&#xA;Copying blob sha256:1fb8e55861a24a229dbd7125ef96fceacc4e19feb6f79ce75c2f6171630ca18d&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying config sha256:7c455bbc0355a2e2f98c9af3281a7f58032707cae89a67ad6602570fe01f9b6f&#xA;Writing manifest to image destination&#xA;sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-12T10:39:52,958205315+00:00] End push&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-12T10:39:53,285677453+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-12T10:40:13,855890763+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-12T10:40:14,654697671+00:00] Prepare SBOM&#xA;[2026-05-12T10:40:14,658428960+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-12 10:40:29,259 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-12 10:40:30,460 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-05-12 10:40:32,283 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:32,983 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:34,394 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:34,994 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:36,291 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:37,010 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:38,296 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:38,781 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:40:38,782 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-12 10:40:38,782 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-12 10:40:38,782 [INFO] mobster.log: Contextual workflow completed in 8.52s&#xA;2026-05-12 10:40:39,055 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-12T10:40:40,155898586+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-container-pod | container step-upload-sbom: &#xA;[2026-05-12T10:40:40,927378282+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6] to [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:sha256-a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:0bc34b560e7aacd8998829920c5da5015f4c7fb23d50439f3ef2ff4840ca1a68&#xA;[2026-05-12T10:41:05,953327116+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-build-image-index-pod | init container: prepare&#xA;2026/05/12 10:41:08 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-build-image-index-pod | init container: place-scripts&#xA;2026/05/12 10:41:09 Decoded script /tekton/scripts/script-0-pd52t&#xA;2026/05/12 10:41:09 Decoded script /tekton/scripts/script-1-fvz7q&#xA;2026/05/12 10:41:09 Decoded script /tekton/scripts/script-2-nh4hs&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-image-index-pod | container step-build: &#xA;[2026-05-12T10:41:38,990005086+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6]&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-fttg-on-pull-request-r2plc-build-image-index]&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-12T10:41:40Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;&#xA;time=&#34;2026-05-12T10:41:41Z&#34; level=info msg=&#34;buildah [stdout] 2285adea99ade4d9ecc2144586f6cf427d97efed42cc1c9e51fb8b2bdbf72ea1&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:41:41Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34;}&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-12T10:41:42,151525454+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-clamav-scan-pod | init container: prepare&#xA;2026/05/12 10:41:46 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-clamav-scan-pod | init container: place-scripts&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-0-pxpn4&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-1-4jzh8&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 128.875 sec (2 m 8 s)&#xA;Start Date: 2026:05:12 10:42:32&#xA;End Date:   2026:05:12 10:44:41&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27998/Tue May 12 06:24:57 2026 Database version: 27998&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778582681&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582681&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582681&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;, &#34;digests&#34;: [&#34;sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34;]}}&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 073627944042 clamscan-result-amd64.log&#xA;Uploading 1bd97bc16a05 clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  073627944042 clamscan-result-amd64.log&#xA;Uploaded  1bd97bc16a05 clamscan-ec-test-amd64.json&#xA;Uploading 18b83cf8a8b2 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  18b83cf8a8b2 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#xA;Digest: sha256:18b83cf8a8b25766fae6fbb94a033a8fd68b6bb2431ecce8cee36f97c73f45fb&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-clone-repository-pod | init container: prepare&#xA;2026/05/12 10:37:23 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-clone-repository-pod | init container: place-scripts&#xA;2026/05/12 10:37:24 Decoded script /tekton/scripts/script-0-wvkbz&#xA;2026/05/12 10:37:24 Decoded script /tekton/scripts/script-1-rhtwv&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582255.1608517,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582255.3777926,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ c4c935f8923d9a47d509406e03eeb97fdf41e7c4 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582255.3778346,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582255.4013197,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision c4c935f8923d9a47d509406e03eeb97fdf41e7c4 directly.&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Executing: oras push --annotation=quay.expires-after=6h --registry-config /tmp/create-oci.sh.nOWdas/auth-0ZjPtG.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4.git SOURCE_ARTIFACT&#xA;Uploading a8aa55d1a25e SOURCE_ARTIFACT&#xA;Uploaded  a8aa55d1a25e SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:c465f57e6ade0dbf6331e62b43bfe42f4e90e11bac9c5c72a5cca1aa3632dfc6&#xA;Artifacts created&#xA;&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-init-pod | init container: prepare&#xA;2026/05/12 10:37:06 Entrypoint initialization&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-init-pod | container step-init: &#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-12T10:37:21Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | init container: prepare&#xA;2026/05/12 10:37:40 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/05/12 10:37:41 Decoded script /tekton/scripts/script-0-kmptt&#xA;2026/05/12 10:37:41 Decoded script /tekton/scripts/script-2-zwmdl&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | container step-skip-ta: &#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-12T10:38:18Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-12T10:38:28Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:38:29Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:38:29Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-prefetch-dependencies-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-sast-shell-check-pod | init container: prepare&#xA;2026/05/12 10:41:46 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-sast-shell-check-pod | init container: place-scripts&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-1-wtnf5&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-2-wwgqk&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-shell-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.xM7RNZ/auth-Lnj0Ty.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-fttg&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-fttg&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-fttg&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/var/workdir/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/var/workdir/source/.&#xA;++ realpath -m /var/workdir/source/.&#xA;+ resolved_path=/var/workdir/source&#xA;+ [[ /var/workdir/source == \/\v\a\r\/\w\o\r\k\d\i\r\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 12800 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=1&#xA;+ SC_JOBS=1&#xA;INFO: Setting SC_JOBS=1 based on cgroups v2 max for run-shellcheck.sh&#xA;+ echo &#39;INFO: Setting SC_JOBS=1 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /var/workdir/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/var/workdir/source /var/workdir/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/var/workdir/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-104.json ./shellcheck-results/sc-110.json ./shellcheck-results/sc-116.json ./shellcheck-results/sc-122.json ./shellcheck-results/sc-128.json ./shellcheck-results/sc-139.json ./shellcheck-results/sc-70.json ./shellcheck-results/sc-86.json ./shellcheck-results/sc-92.json ./shellcheck-results/sc-98.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check-oci-ta-min sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check-oci-ta-min&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check-oci-ta-min &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:03+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading 29d9e22ed1d5 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  29d9e22ed1d5 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#xA;Digest: sha256:29d9e22ed1d569c8bfbfa08a70bfd98948c0876dd6fffa0b8e4a852f05a61af7&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-sast-unicode-check-pod | init container: prepare&#xA;2026/05/12 10:41:46 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-sast-unicode-check-pod | init container: place-scripts&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-1-btkfg&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-2-7dvm4&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-unicode-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.hqD1xM/auth-arCZAv.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a8aa55d1a25ec61d8844839208f7df74d62c4d5f5ab354e27176f120be5b2cb9 to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-fttg&#xA;INFO: The PROJECT_NAME used is: test-comp-fttg&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-fttg&#39;&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta-min success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta-min success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta-min success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:41:52+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta-min success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:41:52+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta-min success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:41:52+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta-min success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:41:52+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta-min success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:41:52+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta-min success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:41:52+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta-min success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading 3c67dc44542b application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  3c67dc44542b application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#xA;Digest: sha256:3c67dc44542b620443d69973261269612788336924fb5ee74c4df6132e1f6f0a&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-tpa-scan-pod | init container: prepare&#xA;2026/05/12 10:41:46 Entrypoint initialization&#xA;&#xA; pod: test-comp-fttg-on-pull-request-r2plc-tpa-scan-pod | init container: place-scripts&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-0-mhf26&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-1-rmrvx&#xA;2026/05/12 10:41:47 Decoded script /tekton/scripts/script-2-t8trv&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-tpa-scan-pod | container step-get-vulnerabilities: &#xA;Inspecting raw image manifest quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6.&#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Downloading SBOMs this way does not ensure its authenticity. If you want to ensure a tamper-proof SBOM, download it using &#39;cosign download attestation &lt;image uri&gt;&#39;.&#xA;Found SBOM of media type: text/spdx+json&#xA;Running TPA scan on amd64 image manifest...&#xA;  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&#xA;                                 Dload  Upload   Total   Spent    Left  Speed&#xA;&#xD;  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0&#xD;100  268k    0     0  100  268k      0   220k  0:00:01  0:00:01 --:--:--  220k&#xD;100  268k    0     0  100  268k      0   121k  0:00:02  0:00:02 --:--:--  121k&#xD;100  268k    0     0  100  268k      0  85378  0:00:03  0:00:03 --:--:-- 85378&#xD;100  268k    0     0  100  268k      0  67352  0:00:04  0:00:04 --:--:-- 67352{&#xA;  &#34;scanned&#34; : {&#xA;    &#34;total&#34; : 130,&#xA;    &#34;direct&#34; : 45,&#xA;    &#34;transitive&#34; : 85&#xA;  },&#xA;  &#34;providers&#34; : {&#xA;    &#34;rhtpa&#34; : {&#xA;      &#34;status&#34; : {&#xA;        &#34;ok&#34; : true,&#xA;        &#34;name&#34; : &#34;rhtpa&#34;,&#xA;        &#34;code&#34; : 200,&#xA;        &#34;message&#34; : &#34;OK&#34;,&#xA;        &#34;warnings&#34; : { }&#xA;      },&#xA;      &#34;sources&#34; : {&#xA;        &#34;osv-github&#34; : {&#xA;          &#34;summary&#34; : {&#xA;            &#34;direct&#34; : 3,&#xA;            &#34;transitive&#34; : 1,&#xA;            &#34;total&#34; : 4,&#xA;            &#34;dependencies&#34; : 3,&#xA;            &#34;critical&#34; : 0,&#xA;            &#34;high&#34; : 3,&#xA;            &#34;medium&#34; : 1,&#xA;            &#34;low&#34; : 0,&#xA;            &#34;remediations&#34; : 0,&#xA;            &#34;recommendations&#34; : 5,&#xA;            &#34;unscanned&#34; : 0&#xA;          },&#xA;          &#34;dependencies&#34; : [ {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/setuptools@65.5.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }, {&#xA;              &#34;id&#34; : &#34;CVE-2022-40897&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2022-40897&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ {&#xA;              &#34;ref&#34; : &#34;pkg:pypi/pip@22.3.1&#34;,&#xA;              &#34;issues&#34; : [ {&#xA;                &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              } ],&#xA;              &#34;highestVulnerability&#34; : {&#xA;                &#34;id&#34; : &#34;CVE-2023-5752&#34;,&#xA;                &#34;source&#34; : &#34;osv-github&#34;,&#xA;                &#34;cvssScore&#34; : 5.5,&#xA;                &#34;severity&#34; : &#34;MEDIUM&#34;,&#xA;                &#34;cves&#34; : [ &#34;CVE-2023-5752&#34; ],&#xA;                &#34;unique&#34; : false&#xA;              }&#xA;            } ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2024-6345&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 8.8,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2024-6345&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/flask@2.1.0&#34;,&#xA;            &#34;issues&#34; : [ {&#xA;              &#34;id&#34; : &#34;CVE-2023-30861&#34;,&#xA;              &#34;title&#34; : &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30861&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            } ],&#xA;            &#34;transitive&#34; : [ ],&#xA;            &#34;highestVulnerability&#34; : {&#xA;              &#34;id&#34; : &#34;CVE-2023-30861&#34;,&#xA;              &#34;title&#34; : &#34;Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header&#34;,&#xA;              &#34;source&#34; : &#34;osv-github&#34;,&#xA;              &#34;cvssScore&#34; : 7.5,&#xA;              &#34;severity&#34; : &#34;HIGH&#34;,&#xA;              &#34;cves&#34; : [ &#34;CVE-2023-30861&#34; ],&#xA;              &#34;unique&#34; : false&#xA;            }&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/click@8.3.3&#34;,&#xA;            &#34;recommendation&#34; : &#34;pkg:pypi/click@8.3.3?repository_url=https%3A%2F%2Fpackages.redhat.com%2Ftrusted-libraries%2Fpython&#34;&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/markupsafe@3.0.3&#34;,&#xA;            &#34;recommendation&#34; : &#34;pkg:pypi/markupsafe@3.0.3?repository_url=https%3A%2F%2Fpackages.redhat.com%2Ftrusted-libraries%2Fpython&#34;&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/werkzeug@3.1.8&#34;,&#xA;            &#34;recommendation&#34; : &#34;pkg:pypi/werkzeug@3.1.8?repository_url=https%3A%2F%2Fpackages.redhat.com%2Ftrusted-libraries%2Fpython&#34;&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/jinja2@3.1.6&#34;,&#xA;            &#34;recommendation&#34; : &#34;pkg:pypi/jinja2@3.1.6?repository_url=https%3A%2F%2Fpackages.redhat.com%2Ftrusted-libraries%2Fpython&#34;&#xA;          }, {&#xA;            &#34;ref&#34; : &#34;pkg:pypi/itsdangerous@2.2.0&#34;,&#xA;            &#34;recommendation&#34; : &#34;pkg:pypi/itsdangerous@2.2.0?repository_url=https%3A%2F%2Fpackages.redhat.com%2Ftrusted-libraries%2Fpython&#34;&#xA;          } ]&#xA;        }&#xA;      }&#xA;    }&#xA;  },&#xA;  &#34;licenses&#34; : [ {&#xA;    &#34;status&#34; : {&#xA;      &#34;ok&#34; : true,&#xA;      &#34;name&#34; : &#34;deps.dev&#34;,&#xA;      &#34;code&#34; : 200,&#xA;      &#34;message&#34; : &#34;OK&#34;,&#xA;      &#34;warnings&#34; : { }&#xA;    },&#xA;    &#34;summary&#34; : {&#xA;      &#34;total&#34; : 9,&#xA;      &#34;concluded&#34; : 115,&#xA;      &#34;permissive&#34; : 7,&#xA;      &#34;weakCopyleft&#34; : 0,&#xA;      &#34;strongCopyleft&#34; : 0,&#xA;      &#34;unknown&#34; : 2,&#xA;      &#34;deprecated&#34; : 0,&#xA;      &#34;osiApproved&#34; : 7,&#xA;      &#34;fsfLibre&#34; : 7&#xA;    },&#xA;    &#34;packages&#34; : {&#xA;      &#34;pkg:deb/debian/libaudit1@1%3A3.0-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/perl-base@5.32.1-4%2Bdeb11u2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libnettle8@3.7.3-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/sed@4.7-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpcre2-8-0@10.36-2%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgdbm6@1.19-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libp11-kit0@0.23.22-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/ncurses-base@6.2%2B20201114-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/debconf@1.5.77&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/flask@2.1.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libbz2-1.0@1.0.8-4&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libkrb5support0@1.18.3-6%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsemanage1@3.1-1%2Bb2?arch=amd64&amp;distro=debian-11&amp;upstream=libsemanage%403.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libreadline8@8.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/apt@2.2.4&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgpg-error0@1.38-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/coreutils@8.32-4%2Bb1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/gpgv@2.2.27-2%2Bdeb11u2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libapt-pkg6.0@2.2.4&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/zlib1g@1%3A1.2.11.dfsg-2%2Bdeb11u2?arch=amd64&amp;distro=debian-11&amp;upstream=zlib&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/itsdangerous@2.2.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/liblz4-1@1.9.3-2&#34; : {&#xA;      &#xD;100  290k    0 23057  100  268k   5652  67335  0:00:04  0:00:04 --:--:-- 72988&#xA;  &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/diffutils@1%3A3.7-5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/grep@3.6-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libdb5.3@5.3.28%2Bdfsg1-0.8&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libunistring2@0.9.10-4&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/sysvinit-utils@2.96-7%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/base-passwd@3.5.51&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/pip@22.3.1&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/hostname@3.23&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/logsave@1.46.2-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpam0g@1.4.0-9%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libc6@2.31-13%2Bdeb11u5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libseccomp2@2.5.1-1%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libexpat1@2.2.10-2%2Bdeb11u5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/liblzma5@5.2.5-2.1~deb11u1?arch=amd64&amp;distro=debian-11&amp;upstream=xz-utils&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/netbase@6.3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/werkzeug@3.1.8&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libssl1.1@1.1.1n-0%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/openssl@1.1.1n-0%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libcrypt1@1%3A4.4.18-4&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsepol1@3.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/adduser@3.118&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpam-modules-bin@1.4.0-9%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/ca-certificates@20210119&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgnutls30@3.7.1-5%2Bdeb11u2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libnsl2@1.3.0-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/readline-common@8.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/markupsafe@3.0.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libattr1@1%3A2.4.48-6?arch=amd64&amp;distro=debian-11&amp;upstream=attr&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/debian-archive-keyring@2021.1.1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/login@1%3A4.8.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libc-bin@2.31-13%2Bdeb11u5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libncursesw6@6.2%2B20201114-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/bash@5.1-2%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libblkid1@2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libaudit-common@1%3A3.0-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libstdc%2B%2B6@10.2.1-6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/base-files@11.1%2Bdeb11u5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libcom-err2@1.46.2-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libdebconfclient0@0.260&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/dpkg@1.20.12&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/mount@2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsmartcols1@2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpam-modules@1.4.0-9%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/wheel@0.38.4&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libtirpc-common@1.3.1-1%2Bdeb11u1?arch=all&amp;distro=debian-11&amp;upstream=libtirpc&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libidn2-0@2.3.0-5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libtirpc3@1.3.1-1%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgssapi-krb5-2@1.18.3-6%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/e2fsprogs@1.46.2-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:generic/python@3.11.1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/mawk@1.3.4.20200120-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/click@8.3.3&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;BSD-3-Clause&#34;,&#xA;            &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;BSD-3-Clause&#34;,&#xA;          &#34;name&#34; : &#34;BSD 3-Clause \&#34;New\&#34; or \&#34;Revised\&#34; License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libhogweed6@3.7.3-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libselinux1@3.1-3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libkrb5-3@1.18.3-6%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libss2@1.46.2-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libzstd1@1.4.8%2Bdfsg-2.1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgcc-s1@10.2.1-6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsystemd0@247.3-7%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/gzip@1.10-4%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libext2fs2@1.46.2-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/findutils@4.8.0-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libudev1@247.3-7%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/init-system-helpers@1.60&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/dash@0.5.11%2Bgit20200708%2Bdd9ef66-5&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/passwd@1%3A4.8.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/jinja2@3.1.6&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;non-standard&#34;,&#xA;            &#34;name&#34; : &#34;non-standard&#34;,&#xA;            &#34;category&#34; : &#34;UNKNOWN&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;non-standard&#34;,&#xA;          &#34;name&#34; : &#34;non-standard&#34;,&#xA;          &#34;category&#34; : &#34;UNKNOWN&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsqlite3-0@3.34.1-3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgmp10@2%3A6.2.1%2Bdfsg-1%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libxxhash0@0.8.0-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpam-runtime@1.4.0-9%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libkeyutils1@1.6.1-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libk5crypto3@1.18.3-6%2Bdeb11u3&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/lsb-base@11.1.0?arch=all&amp;distro=debian-11&amp;upstream=lsb&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libsemanage-common@3.1-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libtinfo6@6.2%2B20201114-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libtasn1-6@4.16.0-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/tar@1.34%2Bdfsg-1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/tzdata@2021a-1%2Bdeb11u8&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:oci/test-comp-fttg@sha256%3Aa6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libcap-ng0@0.7.9-2.2%2Bb1?arch=amd64&amp;distro=debian-11&amp;upstream=libcap-ng%400.7.9-2.2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/gcc-10-base@10.2.1-6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libgcrypt20@1.8.7-6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libuuid1@2.36.1-8%2Bdeb11u1?arch=amd64&amp;distro=debian-11&amp;upstream=util-linux&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libmount1@2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libacl1@2.2.53-10&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libpcre3@2%3A8.39-13&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:pypi/setuptools@65.5.0&#34; : {&#xA;        &#34;concluded&#34; : {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        },&#xA;        &#34;evidence&#34; : [ {&#xA;          &#34;identifiers&#34; : [ {&#xA;            &#34;id&#34; : &#34;MIT&#34;,&#xA;            &#34;name&#34; : &#34;MIT License&#34;,&#xA;            &#34;isDeprecated&#34; : false,&#xA;            &#34;isOsiApproved&#34; : true,&#xA;            &#34;isFsfLibre&#34; : true,&#xA;            &#34;category&#34; : &#34;PERMISSIVE&#34;&#xA;          } ],&#xA;          &#34;expression&#34; : &#34;MIT&#34;,&#xA;          &#34;name&#34; : &#34;MIT License&#34;,&#xA;          &#34;category&#34; : &#34;PERMISSIVE&#34;,&#xA;          &#34;source&#34; : &#34;deps.dev&#34;,&#xA;          &#34;sourceUrl&#34; : &#34;https://api.deps.dev&#34;&#xA;        } ]&#xA;      },&#xA;      &#34;pkg:deb/debian/debianutils@4.11.2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/bsdutils@1%3A2.36.1-8%2Bdeb11u1&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/libffi7@3.3-6&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      },&#xA;      &#34;pkg:deb/debian/ncurses-bin@6.2%2B20201114-2&#34; : {&#xA;        &#34;evidence&#34; : [ ]&#xA;      }&#xA;    }&#xA;  } ]&#xA;}&#xA;pod: test-comp-fttg-on-pull-request-r2plc-tpa-scan-pod | container step-oci-attach-report: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg&#xA;Attaching tpa-report-amd64.json to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#xA;[retry] executing: oras attach --no-tty --format go-template=\{\{.digest\}\} --registry-config /tmp/auth/config.json --artifact-type application/vnd.redhat.tpa-report+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg@sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6 tpa-report-amd64.json:application/vnd.redhat.tpa-report+json&#xA;&#xA;pod: test-comp-fttg-on-pull-request-r2plc-tpa-scan-pod | container step-conftest-vulnerabilities: &#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/tekton/home/tpa-report-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 6,&#xA;&#x9;&#x9;&#34;warnings&#34;: [&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 3 high vulnerabilities.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: osv-github. Affected dependencies: pkg:pypi/setuptools@65.5.0 [direct] (CVE-2024-6345, CVE-2022-40897), pkg:pypi/flask@2.1.0 [direct] (CVE-2023-30861)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_high_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 3&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;{&#xA;&#x9;&#x9;&#x9;&#x9;&#34;msg&#34;: &#34;Found 1 medium vulnerability.&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#34;metadata&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;details&#34;: {&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;description&#34;: &#34;Source: osv-github. Affected dependencies: pkg:pypi/pip@22.3.1 [transitive via pkg:pypi/setuptools@65.5.0] (CVE-2023-5752)&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;name&#34;: &#34;rhtpa_medium_vulnerabilities&#34;,&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;url&#34;: &#34;https://access.redhat.com/articles/red_hat_vulnerability_tutorial&#34;&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;},&#xA;&#x9;&#x9;&#x9;&#x9;&#x9;&#34;vulnerabilities_number&#34;: 1&#xA;&#x9;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;&#x9;}&#xA;&#x9;&#x9;]&#xA;&#x9;}&#xA;]&#xA;{&#34;vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:3,&#34;medium&#34;:1,&#34;low&#34;:0,&#34;unknown&#34;:0},&#34;unpatched_vulnerabilities&#34;:{&#34;critical&#34;:0,&#34;high&#34;:0,&#34;medium&#34;:0,&#34;low&#34;:0,&#34;unknown&#34;:0}}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-fttg:on-pr-c4c935f8923d9a47d509406e03eeb97fdf41e7c4&#34;, &#34;digests&#34;: [&#34;sha256:a6c80538307ad0adeb57e532202bece9afddc4e7102f49eaed56d282dc3f03c6&#34;]}}&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:19+00:00&#34;,&#34;note&#34;:&#34;Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;New PipelineRun test-comp-fttg-on-pull-request-d9t5z found after retrigger for component build-e2e-tgct/test-comp-fttg&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z found for Component build-e2e-tgct/test-comp-fttg&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Running&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Succeeded&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:51:04.377 (13m14.023s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.377&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.377 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000405409">
              <skipped message="skipped - Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry"></skipped>
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:51:04.378&#xA;[SKIPPED] Skipping DockerBuildOciTAMin build, which does not push Dockerfile to registry&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:369 @ 05/12/26 10:51:04.378&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:51:04.378 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.378&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.378 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000309606">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:51:04.378&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:380 @ 05/12/26 10:51:04.379&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:51:04.379 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.379&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:04.379 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.687265594">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:51:04.379&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:51:05.066 (687ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.066&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.066 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.012081205">
              <skipped message="skipped - Skiping DockerBuildOciTAMin build test-comp-fttg-on-pull-request-d9t5z"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:51:05.067&#xA;This is DockerBuildOciTAMin build, which does not require source container build.&#xA;[SKIPPED] Skiping DockerBuildOciTAMin build test-comp-fttg-on-pull-request-d9t5z&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:433 @ 05/12/26 10:51:05.078&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:51:05.078 (12ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.079&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.079 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.130997213">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:51:05.079&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:51:05.097 (18ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:51:05.098&#xA;records for PipelineRun test-comp-fttg-on-pull-request-d9t5z:&#xA;&amp;{[{build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/411ef09a-6c9e-473d-a0e7-6dc401df0da5 0e0d1cda-7570-46ce-8989-ecb08f903c0d 0e0d1cda-7570-46ce-8989-ecb08f903c0d} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/f54263d4-2fdc-48fb-a1dd-25e47e962726 2dcb4209-f2c4-4f1a-b516-a866c8308836 2dcb4209-f2c4-4f1a-b516-a866c8308836} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/afc04602-111a-4bd3-9f12-7bdc7f49e04a 527ec848-68ab-4b47-af8f-a33e637c8c87 527ec848-68ab-4b47-af8f-a33e637c8c87} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/75cc13d9-b51c-4a03-ba90-5d7a40cb36dd 59a3cef3-75f6-4878-811e-1f8298789263 59a3cef3-75f6-4878-811e-1f8298789263} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/6bc2d55a-8a76-414a-ae4b-c9700ca2e7cf 7fd161f0-2292-4ea5-8744-7d58292f3fa8 7fd161f0-2292-4ea5-8744-7d58292f3fa8} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/9b35a461-481c-4837-a538-22c06031dde3 a70b5f14-9a42-4b26-8fdc-36d14f16e19a a70b5f14-9a42-4b26-8fdc-36d14f16e19a} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/bc22b7c0-699b-4cec-bf5f-5c35a3333620 b30e0417-8b4c-439b-80c2-925eeb5610d5 b30e0417-8b4c-439b-80c2-925eeb5610d5} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/f89a7a1e-9ba4-40fd-84f0-c56503fa6d45 c67c1c96-4729-4f1f-8f76-633bc1c245ab c67c1c96-4729-4f1f-8f76-633bc1c245ab} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/b41299f1-5ad5-42ed-af54-afe12179b2ae e4d355e2-e9a7-4666-8b6b-8b07767e5090 e4d355e2-e9a7-4666-8b6b-8b07767e5090} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/420bc4bf-eb71-48f5-8a16-22ba76260eb7 efe1965c-edd5-4a7b-8b26-902a8343d4f7 efe1965c-edd5-4a7b-8b26-902a8343d4f7} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/8959ff9d-6f40-4a4f-814b-1574590a630d fc7a27ad-28c5-4fbb-83fa-7e3d30f01364 fc7a27ad-28c5-4fbb-83fa-7e3d30f01364} {build-e2e-tgct/results/8959ff9d-6f40-4a4f-814b-1574590a630d/records/29641df1-2229-49fe-ae8b-697011d95b1e ffe7dbfc-dffc-4a17-bcba-f7d1be3db6eb ffe7dbfc-dffc-4a17-bcba-f7d1be3db6eb}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:51:05.21 (112ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.21&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.21 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.025717244">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:51:05.211&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:51:05.236 (25ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.236&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:05.236 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="27.728544938">
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:51:05.237&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:51:05.245 (8ms)&#xA;&gt; Enter [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:51:05.245&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-6dlkj&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-6dlkj&#34; to finish&#xA;&lt; Exit [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:51:32.965 (27.72s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:32.965&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:32.965 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.038624033">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:51:32.966&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:661 @ 05/12/26 10:51:32.966&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:51:32.966 (0s)&#xA;&gt; Enter [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:51:32.966&#xA;&lt; Exit [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:51:33.004 (38ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:33.004&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:51:33.004 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="33.518076372">
              <system-err>&gt; Enter [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:51:33.005&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z found for Component build-e2e-tgct/test-comp-fttg&#xA;PipelineRun test-comp-fttg-on-pull-request-d9t5z reason: Succeeded&#xA;&lt; Exit [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:51:33.21 (205ms)&#xA;&gt; Enter [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:51:33.21&#xA;Creating Pipeline &#34;ec-integration-test-scenario-run-7kcst&#34;&#xA;Waiting for pipeline &#34;ec-integration-test-scenario-run-7kcst&#34; to finish&#xA;The PipelineRun ec-integration-test-scenario-run-7kcst in namespace build-e2e-tgct has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 52, 5, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;Tasks Completed: 2 (Failed: 0, Cancelled 0), Skipped: 0&#34;}}&#xA;EC PipelineRun ec-integration-test-scenario-run-7kcst has labels: map[build.appstudio.redhat.com/pipeline:enterprise-contract kueue.x-k8s.io/priority-class:konflux-default kueue.x-k8s.io/queue-name:pipelines-queue tekton.dev/pipeline:enterprise-contract]&#xA;The TaskRun ec-integration-test-scenario-run-7kcst-verify of PipelineRun ec-integration-test-scenario-run-7kcst  has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 52, 5, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;All Steps have completed executing&#34;}}&#xA;got step-summary log: {&#xA;  &#34;timestamp&#34;: &#34;1778583123&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 21,&#xA;  &#34;failures&#34;: 0,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;SUCCESS&#34;&#xA;}&#xA;&#xA;&lt; Exit [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:52:06.475 (33.264s)&#xA;&gt; Enter [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:52:06.475&#xA;&lt; Exit [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:52:06.523 (48ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:52:06.523&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:52:06.523 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="155.709173853">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:52:06.524&#xA;PipelineRun test-comp-jerp-on-pull-request-nwqd7 found for Component build-e2e-tgct/test-comp-jerp&#xA;PipelineRun test-comp-jerp-on-pull-request-nwqd7 reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-jerp-on-pull-request-nwqd7&#34; failed: &#xA; pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | init container: prepare&#xA;2026/05/12 10:40:14 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | init container: place-scripts&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-0-wv5hp&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-1-h6jsp&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-2-lplkr&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-3-6mkj7&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-4-vhbt8&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-5-5j9fx&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-set-skip-for-bundles: &#xA;2026/05/12 10:41:17 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-app-check: &#xA;time=&#34;2026-05-12T10:41:18Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-12T10:41:18Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 for platform amd64&#34;&#xA;time=&#34;2026-05-12T10:41:18Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-1537655763/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1537655763/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1537655763/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1537655763/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-1537655763/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1537655763/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1537655763/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-12T10:41:22Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-05-12T10:41:26Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-12T10:41:26Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-05-12T10:41:26Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 will be paired with digest sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 3646,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 139,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-05-12T10:41:26Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778582486&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;&#xA;pod: test-comp-jerp-on-pull-requ8a3030fd1a3ac1cb31df7ad7f720edfa-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778582486&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-apply-tags-pod | init container: prepare&#xA;2026/05/12 10:40:15 Entrypoint initialization&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-12T10:40:19Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;&#xA;time=&#34;2026-05-12T10:40:19Z&#34; level=info msg=&#34;[param] digest: sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;&#xA;time=&#34;2026-05-12T10:40:19Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-12T10:40:20Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | init container: prepare&#xA;2026/05/12 10:37:52 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | init container: place-scripts&#xA;2026/05/12 10:37:53 Decoded script /tekton/scripts/script-0-v9prm&#xA;2026/05/12 10:37:53 Decoded script /tekton/scripts/script-1-n27dg&#xA;2026/05/12 10:37:53 Decoded script /tekton/scripts/script-2-49fkh&#xA;2026/05/12 10:37:53 Decoded script /tekton/scripts/script-3-g9vzh&#xA;2026/05/12 10:37:53 Decoded script /tekton/scripts/script-4-kmrf2&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | container step-build: &#xA;[2026-05-12T10:38:30,992967022+00:00] Validate context path&#xA;[2026-05-12T10:38:30,996255529+00:00] Update CA trust&#xA;[2026-05-12T10:38:30,997313614+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:38:32,991297639+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-12T10:38:32,996710517+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-12T10:38:33,029370760+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:02,259379352+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-12T10:38:33Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-12T10:38:33Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-05-12T10:39:02,301008092+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-12T10:39:02,304124123+00:00] Add secrets&#xA;[2026-05-12T10:39:02,311264793+00:00] Run buildah build&#xA;[2026-05-12T10:39:02,312295783+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 --label org.opencontainers.image.revision=33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-05-12T10:38:33Z --label org.opencontainers.image.created=2026-05-12T10:38:33Z --annotation org.opencontainers.image.revision=33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-05-12T10:38:33Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.E3Z0Gi -t quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 20.6 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 92.4 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 128.1 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.3-py3-none-any.whl (110 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 110.5/110.5 kB 118.5 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.3 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.1.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34; &#34;org.opencontainers.image.revision&#34;=&#34;33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-12T10:38:33Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-12T10:38:33Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;--&gt; 7998fe3873c2&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;7998fe3873c27ff5de009b9520066fe620f7af68b84af03bc04f4f510ed0df0f&#xA;[2026-05-12T10:39:05,320626106+00:00] Unsetting proxy&#xA;[2026-05-12T10:39:05,321851994+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:a3013b777804928627928e6d4fa4e7724e97b09ea7269d35092b5995384e46ce&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying config sha256:7998fe3873c27ff5de009b9520066fe620f7af68b84af03bc04f4f510ed0df0f&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:06,444450871+00:00] End build&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | container step-push: &#xA;[2026-05-12T10:39:07,153786437+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:39:09,121343339+00:00] Convert image&#xA;[2026-05-12T10:39:09,122362860+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:test-comp-jerp-on-pull-request-nwqd7-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:test-comp-jerp-on-pull-request-nwqd7-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:a3013b777804928627928e6d4fa4e7724e97b09ea7269d35092b5995384e46ce&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying config sha256:7998fe3873c27ff5de009b9520066fe620f7af68b84af03bc04f4f510ed0df0f&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:12,238280255+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /workspace/source/image-digest quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Getting image source signatures&#xA;Copying blob sha256:a3013b777804928627928e6d4fa4e7724e97b09ea7269d35092b5995384e46ce&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying config sha256:7998fe3873c27ff5de009b9520066fe620f7af68b84af03bc04f4f510ed0df0f&#xA;Writing manifest to image destination&#xA;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-12T10:39:13,050857751+00:00] End push&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-12T10:39:13,965826460+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-12T10:39:18,395894259+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-12T10:39:18,530025746+00:00] Prepare SBOM&#xA;[2026-05-12T10:39:18,533676577+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-12 10:39:19,592 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-12 10:39:19,669 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-05-12 10:39:20,238 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:20,440 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:20,874 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:21,110 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:21,539 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:21,763 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:22,193 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:22,383 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:22,383 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-12 10:39:22,383 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-12 10:39:22,384 [INFO] mobster.log: Contextual workflow completed in 2.73s&#xA;2026-05-12 10:39:22,405 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-12T10:39:22,463669442+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-container-pod | container step-upload-sbom: &#xA;[2026-05-12T10:39:22,588618167+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6] to [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:sha256-d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:3872fc6b57f49b914c7be2d5a6df3edb7217013f74f8181b7de114ccaabe950d&#xA;[2026-05-12T10:39:25,998761257+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-build-image-index-pod | init container: prepare&#xA;2026/05/12 10:39:27 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-build-image-index-pod | init container: place-scripts&#xA;2026/05/12 10:39:27 Decoded script /tekton/scripts/script-0-gq9xn&#xA;2026/05/12 10:39:27 Decoded script /tekton/scripts/script-1-2vqww&#xA;2026/05/12 10:39:27 Decoded script /tekton/scripts/script-2-7rnql&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-image-index-pod | container step-build: &#xA;[2026-05-12T10:40:04,759745293+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6]&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-jerp-on-pull-request-nwqd7-build-image-index]&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;buildah [stdout] 04102db8e797112c51037f036309878dd7fcaf09dca2ed58deaf2529aab49c17&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;}&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-12T10:40:08,541357523+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-clamav-scan-pod | init container: prepare&#xA;2026/05/12 10:40:15 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-clamav-scan-pod | init container: place-scripts&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-0-2jv8s&#xA;2026/05/12 10:40:15 Decoded script /tekton/scripts/script-1-9gr49&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 44.431 sec (0 m 44 s)&#xA;Start Date: 2026:05:12 10:40:38&#xA;End Date:   2026:05:12 10:41:22&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27998/Tue May 12 06:24:57 2026 Database version: 27998&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778582482&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582482&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582482&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;, &#34;digests&#34;: [&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;]}}&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading d1078b934609 clamscan-result-amd64.log&#xA;Uploading 108131123caa clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  d1078b934609 clamscan-result-amd64.log&#xA;Uploaded  108131123caa clamscan-ec-test-amd64.json&#xA;Uploading 05b65c272012 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  05b65c272012 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#xA;Digest: sha256:05b65c272012804dfddecd21cb9b2dc6be11a5bc56da8922369a7554a9c96733&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-clone-repository-pod | init container: prepare&#xA;2026/05/12 10:37:28 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-clone-repository-pod | init container: place-scripts&#xA;2026/05/12 10:37:30 Decoded script /tekton/scripts/script-0-8r2cb&#xA;2026/05/12 10:37:30 Decoded script /tekton/scripts/script-1-j5rw5&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582252.1682649,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582252.4306808,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582252.4307415,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582252.4546034,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision 33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 directly.&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-init-pod | init container: prepare&#xA;2026/05/12 10:37:20 Entrypoint initialization&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-init-pod | container step-init: &#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-12T10:37:23Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-prefetch-dependencies-pod | init container: prepare&#xA;2026/05/12 10:37:35 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/05/12 10:37:35 Decoded script /tekton/scripts/script-0-b575z&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] source-dir: /workspace/source/source&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] output-dir: /workspace/source/cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] env-files: [/workspace/source/cachi2/cachi2.env /workspace/source/cachi2/prefetch.env /workspace/source/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-12T10:37:49Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-12T10:37:50Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:37:50Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:37:50Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-push-dockerfile-pod | init container: prepare&#xA;2026/05/12 10:40:21 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-push-dockerfile-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] image-digest: sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-12T10:40:26Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:27Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:8031fce30684b279dc51824107047db7ed032deed24168b51d1afcbb7afa33b4&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:40:27Z&#34; level=info msg=&#34;Containerfile &#39;/workspace/workspace/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:8031fce30684b279dc51824107047db7ed032deed24168b51d1afcbb7afa33b4&#34;}&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-rpms-signature-scan-pod | init container: prepare&#xA;2026/05/12 10:40:20 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-rpms-signature-scan-pod | init container: place-scripts&#xA;2026/05/12 10:40:22 Decoded script /tekton/scripts/script-0-9h44s&#xA;2026/05/12 10:40:22 Decoded script /tekton/scripts/script-1-gsp47&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-rpms-signature-scan-pod | container step-rpms-signature-scan: &#xA;+ set -o pipefail&#xA;+ rpm_verifier --image-url quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635 --image-digest sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6 --workdir /tmp&#xA;Image: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#xA;No unsigned RPMs found&#xA;&#xA;{&#39;keys&#39;: {&#39;unsigned&#39;: 0}}&#xA;====================================&#xA;&#xA;Final results:&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;Images processed:&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;, &#34;digests&#34;: [&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;]}}&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-rpms-signature-scan-pod | container step-output-results: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;++ cat /tmp/status&#xA;+ status=SUCCESS&#xA;++ cat /tmp/results&#xA;+ rpms_data=&#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;++ cat /tmp/images_processed&#xA;+ images_processed=&#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;, &#34;digests&#34;: [&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;]}}&#39;&#xA;+ &#39;[&#39; SUCCESS == ERROR &#39;]&#39;&#xA;+ note=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:17+00:00 --arg result SUCCESS --arg note &#39;Task rpms-signature-scan completed successfully&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:17+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:17+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:17+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:17+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:17+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ echo &#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;+ tee /tekton/results/RPMS_DATA&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;+ echo &#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;, &#34;digests&#34;: [&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;]}}&#39;&#xA;+ tee /tekton/results/IMAGES_PROCESSED&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#34;, &#34;digests&#34;: [&#34;sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#34;]}}&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-shell-check-pod | init container: prepare&#xA;2026/05/12 10:40:21 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-shell-check-pod | init container: place-scripts&#xA;2026/05/12 10:40:21 Decoded script /tekton/scripts/script-0-fpkp9&#xA;2026/05/12 10:40:21 Decoded script /tekton/scripts/script-1-mbnrx&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-shell-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-shell-check-pod | container step-sast-shell-check: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-jerp&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-jerp&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-jerp&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;++ rpm -q --queryformat &#39;%{NAME}-%{VERSION}-%{RELEASE}\n&#39; ShellCheck&#xA;+ PACKAGE_VERSION=ShellCheck-0.10.0-3.el9&#xA;+ OUTPUT_FILE=shellcheck-results.json&#xA;+ SOURCE_CODE_DIR=/workspace/workspace/source&#xA;+ declare -a ALL_TARGETS&#xA;+ IFS=,&#xA;+ read -ra TARGET_ARRAY&#xA;+ for d in &#34;${TARGET_ARRAY[@]}&#34;&#xA;+ potential_path=/workspace/workspace/source/.&#xA;++ realpath -m /workspace/workspace/source/.&#xA;+ resolved_path=/workspace/workspace/source&#xA;+ [[ /workspace/workspace/source == \/\w\o\r\k\s\p\a\c\e\/\w\o\r\k\s\p\a\c\e\/\s\o\u\r\c\e* ]]&#xA;+ ALL_TARGETS+=(&#34;$resolved_path&#34;)&#xA;+ &#39;[&#39; -z &#39;&#39; &#39;]&#39;&#xA;+ &#39;[&#39; -r /sys/fs/cgroup/cpu.max &#39;]&#39;&#xA;+ read -r quota period&#xA;+ &#39;[&#39; 800000 &#39;!=&#39; max &#39;]&#39;&#xA;+ &#39;[&#39; -n 100000 &#39;]&#39;&#xA;+ &#39;[&#39; 100000 -gt 0 &#39;]&#39;&#xA;+ export SC_JOBS=8&#xA;+ SC_JOBS=8&#xA;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#xA;+ echo &#39;INFO: Setting SC_JOBS=8 based on cgroups v2 max for run-shellcheck.sh&#39;&#xA;+ /usr/share/csmock/scripts/run-shellcheck.sh /workspace/workspace/source&#xA;Looking for shell scripts................ done&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/applypatch-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/post-update.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/prepare-commit-msg.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-applypatch.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-merge-commit.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-push.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-rebase.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/pre-receive.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/push-to-checkout.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/sendemail-validate.sample&#xA;+ timeout 30 shellcheck --format=json1 --external-sources --source-path=/workspace/workspace/source /workspace/workspace/source/.git/hooks/update.sample&#xA;+ CSGREP_OPTS=(--mode=json --strip-path-prefix=&#34;$SOURCE_CODE_DIR&#34;/ --remove-duplicates --embed-context=3 --set-scan-prop=&#34;ShellCheck:${PACKAGE_VERSION}&#34;)&#xA;+ [[ true == \t\r\u\e ]]&#xA;+ CSGREP_EVENT_FILTER=&#39;\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|&#39;&#xA;+ CSGREP_EVENT_FILTER+=&#39;2218|2224|2225|2242|2256|2258|2261)\]$&#39;&#xA;+ CSGREP_OPTS+=(--event=&#34;$CSGREP_EVENT_FILTER&#34;)&#xA;+ csgrep --mode=json --strip-path-prefix=/workspace/workspace/source/ --remove-duplicates --embed-context=3 --set-scan-prop=ShellCheck:ShellCheck-0.10.0-3.el9 &#39;--event=\[SC(1020|1035|1054|1066|1068|1073|1080|1083|1099|1113|1115|1127|1128|1143|2043|2050|2055|2057|2066|2069|2071|2077|2078|2091|2092|2157|2171|2193|2194|2195|2215|2216|2218|2224|2225|2242|2256|2258|2261)\]$&#39; ./shellcheck-results/empty.json ./shellcheck-results/sc-103.json ./shellcheck-results/sc-116.json ./shellcheck-results/sc-117.json ./shellcheck-results/sc-119.json ./shellcheck-results/sc-70.json ./shellcheck-results/sc-73.json ./shellcheck-results/sc-74.json ./shellcheck-results/sc-76.json ./shellcheck-results/sc-79.json ./shellcheck-results/sc-82.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;+ curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;ShellCheck results have been saved to shellcheck-results.json&#xA;+ echo &#39;ShellCheck results have been saved to shellcheck-results.json&#39;&#xA;+ csgrep --mode=evtstat shellcheck-results.json&#xA;+ csgrep --mode=sarif shellcheck-results.json&#xA;+ TEST_OUTPUT=&#xA;+ parse_test_output sast-shell-check sarif shellcheck-results.sarif&#xA;+ TEST_NAME=sast-shell-check&#xA;+ TEST_RESULT_FORMAT=sarif&#xA;+ TEST_RESULT_FILE=shellcheck-results.sarif&#xA;+ &#39;[&#39; -z sast-shell-check &#39;]&#39;&#xA;+ &#39;[&#39; -z sarif &#39;]&#39;&#xA;+ &#39;[&#39; -z shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; &#39;!&#39; -f shellcheck-results.sarif &#39;]&#39;&#xA;+ &#39;[&#39; sarif = sarif &#39;]&#39;&#xA;+++ jq -rce &#39;(if (.runs[].results | length &gt; 0) then &#34;FAILURE&#34; else &#34;SUCCESS&#34; end)&#39; shellcheck-results.sarif&#xA;+++ jq -rce &#39;(.runs[].results | length)&#39; shellcheck-results.sarif&#xA;++ make_result_json -r SUCCESS -f 0&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ FAILURES=0&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:05+00:00 --arg result SUCCESS --arg note &#39;For details, check Tekton task log.&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ jq .failures&#xA;+ &#39;[&#39; 0 -gt 0 &#39;]&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;For details, check Tekton task log.&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-shell-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6 shellcheck-results.sarif:application/sarif+json&#xA;Preparing shellcheck-results.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading da808faebf6f shellcheck-results.sarif&#xA;Uploaded  da808faebf6f shellcheck-results.sarif&#xA;Uploading 3d65d1a4e45e application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  3d65d1a4e45e application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#xA;Digest: sha256:3d65d1a4e45e8fe7e8900a0d9b0bbb6da27fafd54b346527f72c6ebc6325a610&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-snyk-check-pod | init container: prepare&#xA;2026/05/12 10:40:21 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-snyk-check-pod | init container: place-scripts&#xA;2026/05/12 10:40:21 Decoded script /tekton/scripts/script-0-xn4p8&#xA;2026/05/12 10:40:21 Decoded script /tekton/scripts/script-1-l6t67&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-snyk-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-snyk-check-pod | container step-sast-snyk-check: &#xA;INFO: The PROJECT_NAME used is: test-comp-jerp&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;{&#34;result&#34;:&#34;SKIPPED&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:05+00:00&#34;,&#34;note&#34;:&#34;Task sast-snyk-check skipped: If you wish to use the Snyk code SAST task, please create a secret name snyk-secret with the key &#39;snyk_token&#39; containing the Snyk token by following the steps given [here](https://konflux-ci.dev/docs/testing/build/snyk/)&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-snyk-check-pod | container step-upload: &#xA;No sast_snyk_check_out.sarif exists. Skipping upload.&#xA;No excluded-findings.json exists. Skipping upload.&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-unicode-check-pod | init container: prepare&#xA;2026/05/12 10:40:21 Entrypoint initialization&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-unicode-check-pod | init container: place-scripts&#xA;2026/05/12 10:40:22 Decoded script /tekton/scripts/script-0-jx2l4&#xA;2026/05/12 10:40:22 Decoded script /tekton/scripts/script-1-9c5vl&#xA;&#xA; pod: test-comp-jerp-on-pull-request-nwqd7-sast-unicode-check-pod | init container: working-dir-initializer&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-jerp&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-jerp&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-jerp&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /workspace/workspace/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/workspace/workspace/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:03+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:03+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-jerp-on-pull-request-nwqd7-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading f2428b8c139b application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  f2428b8c139b application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-jerp:on-pr-33f1dcd6a3c0cf828d9ef99a4181b12d7bdf6635@sha256:d7abcc2bee541fba8636fd089b9954982f3283a1e9265a770490da4507d38eb6&#xA;Digest: sha256:f2428b8c139b108217ae598f11a67cf62afc15b58d80831e64e9a2415a87ba7a&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun test-comp-jerp-on-pull-request-fjz9l found after retrigger for component build-e2e-tgct/test-comp-jerp&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l found for Component build-e2e-tgct/test-comp-jerp&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: ResolvingTaskRef&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Running&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:54:42.233 (2m35.709s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:42.233&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:42.233 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="4.385820067">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:54:42.234&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:54:46.619 (4.385s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:46.619&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:46.619 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000455619">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:54:46.62&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:380 @ 05/12/26 10:54:46.62&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:54:46.62 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:46.62&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:46.62 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.383461742">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:54:46.621&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:54:47.004 (383ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.004&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.004 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.015029489">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:54:47.005&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:440 @ 05/12/26 10:54:47.019&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:54:47.019 (15ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.02&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.02 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.113089058">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:54:47.02&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:54:47.04 (20ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:54:47.04&#xA;records for PipelineRun test-comp-jerp-on-pull-request-fjz9l:&#xA;&amp;{[{build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/a053fbc1-d775-4deb-a66f-1bcf7a1c91e7 00e2a6ff-b3f1-4d53-8c19-e41225ccbecb 00e2a6ff-b3f1-4d53-8c19-e41225ccbecb} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/9def5087-b0f2-4af2-b66d-491e81f7267e 1636333b-a79f-4b79-b536-6649309f2e2e 1636333b-a79f-4b79-b536-6649309f2e2e} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/1c75eef4-ca11-4af8-a56c-0bd23782f58e 23fd9a14-f230-4585-a55e-e331273eafea 23fd9a14-f230-4585-a55e-e331273eafea} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/3efba0fd-7e52-44dc-aad2-cb313db9b7a7 2aaebe34-e2b2-4fc1-a799-9cf1c534679d 2aaebe34-e2b2-4fc1-a799-9cf1c534679d} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/4df71482-f35e-4158-b952-163257a84c30 44f7683e-1aed-4bc5-b302-8a65ad273730 44f7683e-1aed-4bc5-b302-8a65ad273730} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/f0d5f4d4-a1c3-4757-976e-edd5c452a29f 6a7f99d5-b269-401b-84d4-07767dcf2d40 6a7f99d5-b269-401b-84d4-07767dcf2d40} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/92629e2c-4365-455c-9ce3-169ed9647867 7d8ea529-fc2d-46b1-a933-35d165fa2d33 7d8ea529-fc2d-46b1-a933-35d165fa2d33} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/3f784c4d-4f86-462b-8f6c-6c88803e21d1 7e98c0a5-2fb6-457d-b655-724bdfa74a32 7e98c0a5-2fb6-457d-b655-724bdfa74a32} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/49203adf-9681-4fe5-aeb8-52cec4420741 8042b1f9-a90a-499e-a787-0f3201f80ceb 8042b1f9-a90a-499e-a787-0f3201f80ceb} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/08bf21e9-ddd9-4507-8e26-b5eadd4774c1 8da0fcc8-2456-43d0-be5b-d1e6fe92f090 8da0fcc8-2456-43d0-be5b-d1e6fe92f090} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/d4f25ec2-7f33-4b29-9bc4-9c62599f6947 c169c0f5-0b81-498e-9eb1-28924bc5b083 c169c0f5-0b81-498e-9eb1-28924bc5b083} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/fa9b93d7-25f9-4c11-966a-12a040c267b6 c60059de-af90-4b24-ada0-883e8ae700ec c60059de-af90-4b24-ada0-883e8ae700ec} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/5708492d-a7d8-4e53-8c02-8f5d5c310bc8 da07791c-b47b-40d2-9ad6-8a50c282023a da07791c-b47b-40d2-9ad6-8a50c282023a} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/5e0d3058-9a58-4f27-b2d6-fa64f40e8fd6 df761fb7-1c79-4009-a8ba-0e980f601fc8 df761fb7-1c79-4009-a8ba-0e980f601fc8} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/c4e5f31c-7b60-4ed2-9a47-1e273d23d6dd e94d76a7-b395-464c-8062-c294016620e2 e94d76a7-b395-464c-8062-c294016620e2} {build-e2e-tgct/results/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae/records/ca4069d9-34c7-4b4b-8050-6274a9b0b9ae eb13198b-52be-4390-9f04-2fe5879eb0ad eb13198b-52be-4390-9f04-2fe5879eb0ad}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:54:47.133 (93ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.133&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.133 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.20807956">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:54:47.134&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:54:47.341 (208ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.342&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:54:47.342 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="21.494114177">
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:54:47.342&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:54:47.353 (11ms)&#xA;&gt; Enter [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:54:47.353&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-wnnfp&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-wnnfp&#34; to finish&#xA;&lt; Exit [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:55:08.836 (21.483s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:08.836&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:08.836 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.038755659">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:55:08.837&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:661 @ 05/12/26 10:55:08.837&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:55:08.837 (0s)&#xA;&gt; Enter [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:55:08.837&#xA;&lt; Exit [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:55:08.875 (38ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:08.876&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:08.876 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="24.477624304">
              <system-err>&gt; Enter [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:55:08.876&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l found for Component build-e2e-tgct/test-comp-jerp&#xA;PipelineRun test-comp-jerp-on-pull-request-fjz9l reason: Completed&#xA;&lt; Exit [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:55:09.084 (208ms)&#xA;&gt; Enter [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:55:09.084&#xA;Creating Pipeline &#34;ec-integration-test-scenario-run-fz7q5&#34;&#xA;Waiting for pipeline &#34;ec-integration-test-scenario-run-fz7q5&#34; to finish&#xA;The PipelineRun ec-integration-test-scenario-run-fz7q5 in namespace build-e2e-tgct has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 55, 32, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;Tasks Completed: 2 (Failed: 0, Cancelled 0), Skipped: 0&#34;}}&#xA;EC PipelineRun ec-integration-test-scenario-run-fz7q5 has labels: map[build.appstudio.redhat.com/pipeline:enterprise-contract kueue.x-k8s.io/priority-class:konflux-default kueue.x-k8s.io/queue-name:pipelines-queue tekton.dev/pipeline:enterprise-contract]&#xA;The TaskRun ec-integration-test-scenario-run-fz7q5-verify of PipelineRun ec-integration-test-scenario-run-fz7q5  has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 55, 32, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;All Steps have completed executing&#34;}}&#xA;got step-summary log: {&#xA;  &#34;timestamp&#34;: &#34;1778583330&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 21,&#xA;  &#34;failures&#34;: 0,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;SUCCESS&#34;&#xA;}&#xA;&#xA;&lt; Exit [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:55:33.307 (24.223s)&#xA;&gt; Enter [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:55:33.307&#xA;&lt; Exit [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:55:33.353 (46ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:33.354&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:55:33.354 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="195.191896074">
              <system-err>&gt; Enter [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:55:33.354&#xA;PipelineRun test-comp-zsrs-on-pull-request-w5s5g found for Component build-e2e-tgct/test-comp-zsrs&#xA;PipelineRun test-comp-zsrs-on-pull-request-w5s5g reason: Failed&#xA;attempt 1/3: PipelineRun &#34;test-comp-zsrs-on-pull-request-w5s5g&#34; failed: &#xA; pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | init container: prepare&#xA;2026/05/12 10:40:13 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | init container: place-scripts&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-0-phxjg&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-1-6kj5l&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-2-czjtj&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-3-7jzxg&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-4-zdmp2&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-5-7xgvp&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;The media type of the OCI artifact is application/vnd.oci.image.manifest.v1+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-set-skip-for-bundles: &#xA;2026/05/12 10:40:40 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-app-check: &#xA;time=&#34;2026-05-12T10:40:41Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.17.2 &lt;commit: eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&gt;&#34;&#xA;time=&#34;2026-05-12T10:40:41Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 for platform amd64&#34;&#xA;time=&#34;2026-05-12T10:40:41Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=error msg=&#34;could not get rpm list, continuing without it&#34; error=&#34;could not find rpm db/packages: stat /tmp/preflight-1817519894/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1817519894/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1817519894/fs/var/lib/rpm/Packages: no such file or directory&#34;&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-1817519894/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages err=&#34;unable to get a list of all packages in the image: could not get rpm list: could not find rpm db/packages: stat /tmp/preflight-1817519894/fs/usr/lib/sysimage/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1817519894/fs/var/lib/rpm/rpmdb.sqlite: no such file or directory\nstat /tmp/preflight-1817519894/fs/var/lib/rpm/Packages: no such file or directory&#34; result=ERROR&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=FAILED&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;detected empty USER. Presumed to be running as root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;USER value must be provided and be a non-root value for this check to pass&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-12T10:40:45Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=FAILED&#xA;time=&#34;2026-05-12T10:40:48Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-12T10:40:49Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=FAILED&#xA;time=&#34;2026-05-12T10:40:49Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 will be paired with digest sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.17.2&#34;,&#xA;        &#34;commit&#34;: &#34;eb87e5b2d67ad110a0afe8edfb16f445e0877c4e&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 3803,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;,&#xA;                &#34;help&#34;: &#34;Check HasRequiredLabel encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Add the following labels to your Dockerfile or Containerfile: name, vendor, version, release, summary, description, maintainer.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;,&#xA;                &#34;help&#34;: &#34;Check RunAsNonRoot encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Indicate a specific USER in the dockerfile or containerfile&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 205,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;,&#xA;                &#34;help&#34;: &#34;Check BasedOnUbi encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Change the FROM directive in your Dockerfile or Containerfile, for the latest list of images and details refer to: https://catalog.redhat.com/software/base-images&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;,&#xA;                &#34;help&#34;: &#34;Check HasNoProhibitedPackages encountered an error. Please review the preflight.log file for more information.&#34;&#xA;            }&#xA;        ]&#xA;    }&#xA;}&#xA;time=&#34;2026-05-12T10:40:49Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778582449&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;&#xA;pod: test-comp-zsrs-on-pull-requ72aca27106c22cccc9659971419b25d6-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;ERROR&#34;,&#34;timestamp&#34;:&#34;1778582449&#34;,&#34;note&#34;:&#34;Task preflight is a ERROR: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:3,&#34;failures&#34;:4,&#34;warnings&#34;:0}&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-apply-tags-pod | init container: prepare&#xA;2026/05/12 10:40:15 Entrypoint initialization&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-apply-tags-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-12T10:40:18Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;&#xA;time=&#34;2026-05-12T10:40:18Z&#34; level=info msg=&#34;[param] digest: sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;&#xA;time=&#34;2026-05-12T10:40:18Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-12T10:40:19Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | init container: prepare&#xA;2026/05/12 10:38:05 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | init container: place-scripts&#xA;2026/05/12 10:38:06 Decoded script /tekton/scripts/script-1-qghbs&#xA;2026/05/12 10:38:06 Decoded script /tekton/scripts/script-2-zl68l&#xA;2026/05/12 10:38:06 Decoded script /tekton/scripts/script-3-wgnsc&#xA;2026/05/12 10:38:06 Decoded script /tekton/scripts/script-4-dfh55&#xA;2026/05/12 10:38:06 Decoded script /tekton/scripts/script-5-rzzwd&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.wLyMDQ/auth-MIcSKD.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-build: &#xA;[2026-05-12T10:38:37,440493915+00:00] Validate context path&#xA;[2026-05-12T10:38:37,443744014+00:00] Update CA trust&#xA;[2026-05-12T10:38:37,444788905+00:00] Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:38:39,505316810+00:00] Prepare Dockerfile&#xA;Checking if /var/workdir/cachi2/output/bom.json exists.&#xA;Could not find prefetched sbom. No content_sets found for ICM&#xA;[2026-05-12T10:38:39,510897294+00:00] Prepare system (architecture: x86_64)&#xA;[2026-05-12T10:38:39,523649754+00:00] Setup prefetched&#xA;Trying to pull quay.io/devfile/python:slim...&#xA;Getting image source signatures&#xA;Copying blob sha256:0f372def914e585a52a46de64d0ed00b960c02f5f81a307d673e73b404203d61&#xA;Copying blob sha256:2f9c09f7c02f4403f9ec5313e53e63eafe6cd43993457b810ce1b9642812daec&#xA;Copying blob sha256:778656c04542093db6d3b6e07bffbcf6ec4b24709276be7cdf177fcb3666663a&#xA;Copying blob sha256:30fb943195a7f7cee90a9c67461c338d1d76a7004d2f94792b774ef71d875a02&#xA;Copying blob sha256:025c56f98b679f70b7a54241917e56da7b59ab9d2defecc6ebdb0bf2750484bb&#xA;Copying config sha256:04f51101c1b979fb8a45a5332bfa8ed2c60f613ea396c3edd40f3d91702b24ef&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:11,995818048+00:00] Unsetting proxy&#xA;{&#xA;  &#34;architecture&#34;: &#34;x86_64&#34;,&#xA;  &#34;vcs-type&#34;: &#34;git&#34;,&#xA;  &#34;vcs-ref&#34;: &#34;ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;,&#xA;  &#34;org.opencontainers.image.revision&#34;: &#34;ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;,&#xA;  &#34;org.opencontainers.image.source&#34;: &#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34;,&#xA;  &#34;quay.expires-after&#34;: &#34;6h&#34;,&#xA;  &#34;build-date&#34;: &#34;2026-05-12T10:38:39Z&#34;,&#xA;  &#34;org.opencontainers.image.created&#34;: &#34;2026-05-12T10:38:39Z&#34;,&#xA;  &#34;io.buildah.version&#34;: &#34;1.42.2&#34;&#xA;}&#xA;[2026-05-12T10:39:12,037284358+00:00] Register sub-man&#xA;Adding the entitlement to the build&#xA;[2026-05-12T10:39:12,040666213+00:00] Add secrets&#xA;[2026-05-12T10:39:12,047806752+00:00] Run buildah build&#xA;[2026-05-12T10:39:12,048840391+00:00] buildah build --volume /tmp/entitlement:/etc/pki/entitlement --security-opt=unmask=/proc/interrupts --label architecture=x86_64 --label vcs-type=git --label vcs-ref=ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 --label org.opencontainers.image.revision=ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 --label org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --label quay.expires-after=6h --label build-date=2026-05-12T10:38:39Z --label org.opencontainers.image.created=2026-05-12T10:38:39Z --annotation org.opencontainers.image.revision=ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 --annotation org.opencontainers.image.source=https://github.com/redhat-appstudio-qe/devfile-sample-python-basic --annotation org.opencontainers.image.created=2026-05-12T10:38:39Z --tls-verify=true --no-cache --ulimit nofile=4096:4096 --http-proxy=false -f /tmp/Dockerfile.yzm4b4 -t quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 . &#xA;STEP 1/11: FROM quay.io/devfile/python:slim&#xA;STEP 2/11: EXPOSE 8081/tcp&#xA;STEP 3/11: ENV FLASK_PORT=8081&#xA;STEP 4/11: WORKDIR /projects&#xA;STEP 5/11: COPY requirements.txt .&#xA;STEP 6/11: RUN pip install -r requirements.txt&#xA;Collecting Flask==2.1.0&#xA;  Downloading Flask-2.1.0-py3-none-any.whl (95 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 95.2/95.2 kB 16.2 MB/s eta 0:00:00&#xA;Collecting Werkzeug&gt;=2.0&#xA;  Downloading werkzeug-3.1.8-py3-none-any.whl (226 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 226.5/226.5 kB 74.6 MB/s eta 0:00:00&#xA;Collecting Jinja2&gt;=3.0&#xA;  Downloading jinja2-3.1.6-py3-none-any.whl (134 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 134.9/134.9 kB 126.8 MB/s eta 0:00:00&#xA;Collecting itsdangerous&gt;=2.0&#xA;  Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB)&#xA;Collecting click&gt;=8.0&#xA;  Downloading click-8.3.3-py3-none-any.whl (110 kB)&#xA;     ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 110.5/110.5 kB 113.7 MB/s eta 0:00:00&#xA;Collecting MarkupSafe&gt;=2.0&#xA;  Downloading markupsafe-3.0.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (22 kB)&#xA;Installing collected packages: MarkupSafe, itsdangerous, click, Werkzeug, Jinja2, Flask&#xA;Successfully installed Flask-2.1.0 Jinja2-3.1.6 MarkupSafe-3.0.3 Werkzeug-3.1.8 click-8.3.3 itsdangerous-2.2.0&#xA;WARNING: Running pip as the &#39;root&#39; user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv&#xA;&#xA;[notice] A new release of pip available: 22.3.1 -&gt; 26.1.1&#xA;[notice] To update, run: pip install --upgrade pip&#xA;STEP 7/11: COPY . .&#xA;STEP 8/11: CMD [ &#34;python&#34;, &#34;./app.py&#34; ]&#xA;STEP 9/11: COPY labels.json /usr/share/buildinfo/labels.json&#xA;STEP 10/11: COPY labels.json /root/buildinfo/labels.json&#xA;STEP 11/11: LABEL &#34;architecture&#34;=&#34;x86_64&#34; &#34;vcs-type&#34;=&#34;git&#34; &#34;vcs-ref&#34;=&#34;ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34; &#34;org.opencontainers.image.revision&#34;=&#34;ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34; &#34;org.opencontainers.image.source&#34;=&#34;https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#34; &#34;quay.expires-after&#34;=&#34;6h&#34; &#34;build-date&#34;=&#34;2026-05-12T10:38:39Z&#34; &#34;org.opencontainers.image.created&#34;=&#34;2026-05-12T10:38:39Z&#34;&#xA;COMMIT quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;--&gt; 50326a369a5c&#xA;Successfully tagged quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;50326a369a5cd7275cc2d59681aedf72738d1d1393ff1fe42bc9239cbefa327a&#xA;[2026-05-12T10:39:15,222541025+00:00] Unsetting proxy&#xA;[2026-05-12T10:39:15,223801319+00:00] Add metadata&#xA;Recording base image digests used&#xA;quay.io/devfile/python:slim quay.io/devfile/python:slim@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;Getting image source signatures&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying blob sha256:2fe2719d4d0c8a54e8de74cae6c673a1a440efcb88e6ae457e4fcddb1a8693b8&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying config sha256:50326a369a5cd7275cc2d59681aedf72738d1d1393ff1fe42bc9239cbefa327a&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:16,829521381+00:00] End build&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-push: &#xA;[2026-05-12T10:39:17,527517337+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;[2026-05-12T10:39:19,549208338+00:00] Convert image&#xA;[2026-05-12T10:39:19,550247188+00:00] Push image with unique tag&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:test-comp-zsrs-on-pull-request-w5s5g-build-container&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:test-comp-zsrs-on-pull-request-w5s5g-build-container&#xA;Getting image source signatures&#xA;Copying blob sha256:2fe2719d4d0c8a54e8de74cae6c673a1a440efcb88e6ae457e4fcddb1a8693b8&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:50326a369a5cd7275cc2d59681aedf72738d1d1393ff1fe42bc9239cbefa327a&#xA;Writing manifest to image destination&#xA;[2026-05-12T10:39:22,466839463+00:00] Push image with git revision&#xA;Pushing to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;[retry] executing: buildah push --format=oci --retry 3 --tls-verify=true --digestfile /var/workdir/image-digest quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 docker://quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;Getting image source signatures&#xA;Copying blob sha256:2fe2719d4d0c8a54e8de74cae6c673a1a440efcb88e6ae457e4fcddb1a8693b8&#xA;Copying blob sha256:b5ebffba54d3e3f7fd80435fcdc34c4a96fdb2ecab0f0a298fe08f74c2f69d29&#xA;Copying blob sha256:d9892173749de078dfb702835e9e3858aff86e7447fb11c5a2f2c6bb10f882f6&#xA;Copying blob sha256:609bcd29c7943a6667e3204bfa5b86a07d255f78ebc26d4c4e8981b335ac3b9a&#xA;Copying blob sha256:d326469892d974408d96f1e02d64dce10d20f88613688af11e99e3e22523beeb&#xA;Copying blob sha256:0a7eaca7a2e7e116a5658c409ea2ceb98226b7481a3b0f90c8d94d9f230fe238&#xA;Copying config sha256:50326a369a5cd7275cc2d59681aedf72738d1d1393ff1fe42bc9239cbefa327a&#xA;Writing manifest to image destination&#xA;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;[retry] executing: kubectl get configmap cluster-config -n konflux-info -o json&#xA;Keyless signing is disabled (none of rekorInternalUrl, fulcioInternalUrl, defaultOIDCIssuer, tufInternalUrl are configured in the konflux-info/cluster-config configmap)&#xA;[2026-05-12T10:39:23,338955260+00:00] End push&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-sbom-syft-generate: &#xA;[2026-05-12T10:39:23,609442332+00:00] Generate SBOM&#xA;Running syft on the image&#xA;Running syft on the source code&#xA;[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)&#xA;[2026-05-12T10:39:28,297235610+00:00] End sbom-syft-generate&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-prepare-sboms: &#xA;[2026-05-12T10:39:28,466897928+00:00] Prepare SBOM&#xA;[2026-05-12T10:39:28,470771862+00:00] Generate SBOM with mobster&#xA;Skipping SBOM validation&#xA;2026-05-12 10:39:29,535 [INFO] mobster.log: Logging level set to 20&#xA;2026-05-12 10:39:29,613 [INFO] mobster.oci: Fetching manifest for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c&#xA;2026-05-12 10:39:30,181 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:30,419 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:30,933 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:31,133 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:31,589 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:31,800 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:32,320 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type spdxjson failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:32,539 [WARNING] mobster.oci.cosign.anonymous_fetcher: Cosign fetching attestation of type cyclonedx failed for quay.io/devfile/python@sha256:54924a2ee4a2ef17028ae076ce38e59b3f4054353a5c9f9318dfaee60377532c with output b&#39;Error: found no attestations\nerror during command execution: found no attestations\n&#39;&#xA;2026-05-12 10:39:32,539 [INFO] mobster.cmd.generate.oci_image.contextual_sbom.contextualize: Contextual mechanism won&#39;t be used, there is no parent image SBOM.&#xA;2026-05-12 10:39:32,539 [INFO] mobster.cmd.generate.oci_image: Contextual SBOM workflow finished successfully.&#xA;2026-05-12 10:39:32,540 [INFO] mobster.log: Contextual workflow completed in 2.94s&#xA;2026-05-12 10:39:32,562 [INFO] mobster.main: Exiting with code 0.&#xA;[2026-05-12T10:39:32,625897443+00:00] End prepare-sboms&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-container-pod | container step-upload-sbom: &#xA;[2026-05-12T10:39:33,541396915+00:00] Upload SBOM&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Pushing sbom to registry&#xA;[retry] executing: cosign attach sbom --sbom sbom.json --type spdx quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#xA;WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations.&#xA;WARNING: Attaching SBOMs this way does not sign them. To sign them, use &#39;cosign attest --predicate sbom.json --key &lt;key path&gt;&#39;.&#xA;Uploading SBOM file for [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9] to [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:sha256-80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9.sbom] with mediaType [text/spdx+json].&#xA;&#xA;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:27c7636b0ff897382f96710e79022ea177b6c554a2b2e3e51cc8cf224846ab6c&#xA;[2026-05-12T10:39:36,843966415+00:00] End upload-sbom&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-build-image-index-pod | init container: prepare&#xA;2026/05/12 10:39:40 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-build-image-index-pod | init container: place-scripts&#xA;2026/05/12 10:39:41 Decoded script /tekton/scripts/script-0-vsqmq&#xA;2026/05/12 10:39:41 Decoded script /tekton/scripts/script-1-frvld&#xA;2026/05/12 10:39:41 Decoded script /tekton/scripts/script-2-h5b8z&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-image-index-pod | container step-build: &#xA;[2026-05-12T10:40:04,903751781+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Running konflux-build-cli&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] image: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] images: [quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9]&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] buildah-format: oci&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] always-build-index: false&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] additional-tags: [test-comp-zsrs-on-pull-request-w5s5g-build-image-index]&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] output-manifest-path: /index-build-data/manifest_data.json&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-digest: /tekton/results/IMAGE_DIGEST&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-url: /tekton/results/IMAGE_URL&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;[param] result-path-images: /tekton/results/IMAGES&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;Creating manifest list: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;buildah [stdout] 2c852acbd4793b6a577116aa9c445d5dbd6026fdc7f7f09a368f71c00d020bae&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:40:06Z&#34; level=info msg=&#34;Skipping image index generation. Returning results for single image.&#34;&#xA;{&#34;image_digest&#34;:&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;,&#34;image_url&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;,&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;,&#34;images&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;}&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-image-index-pod | container step-create-sbom: &#xA;The manifest_data.json file does not exist. Skipping the SBOM creation...&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-build-image-index-pod | container step-upload-sbom: &#xA;[2026-05-12T10:40:08,543735542+00:00] Update CA trust&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;The index.spdx.json file does not exists. Skipping the SBOM upload...&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-clamav-scan-pod | init container: prepare&#xA;2026/05/12 10:40:14 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-clamav-scan-pod | init container: place-scripts&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-0-kcsjr&#xA;2026/05/12 10:40:14 Decoded script /tekton/scripts/script-1-82wtz&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-clamav-scan-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 45.478 sec (0 m 45 s)&#xA;Start Date: 2026:05:12 10:40:38&#xA;End Date:   2026:05:12 10:41:23&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27998/Tue May 12 06:24:57 2026 Database version: 27998&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1778582483&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582483&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1778582483&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;, &#34;digests&#34;: [&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;]}}&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-clamav-scan-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Uploading 37fcb6bf2493 clamscan-ec-test-amd64.json&#xA;Uploading 7234cede0eb2 clamscan-result-amd64.log&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploaded  37fcb6bf2493 clamscan-ec-test-amd64.json&#xA;Uploaded  7234cede0eb2 clamscan-result-amd64.log&#xA;Uploading 70dff29cc2aa application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  70dff29cc2aa application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#xA;Digest: sha256:70dff29cc2aa555b9a28e64c87c51b1548955cd0d6ffae8d9b9bdf679932325d&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-clone-repository-pod | init container: prepare&#xA;2026/05/12 10:37:36 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-clone-repository-pod | init container: place-scripts&#xA;2026/05/12 10:37:36 Decoded script /tekton/scripts/script-0-cxv2w&#xA;2026/05/12 10:37:36 Decoded script /tekton/scripts/script-1-nrshk&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-clone-repository-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582264.8068695,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582265.0540895,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 (grafted, HEAD) in path /var/workdir/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582265.054135,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582265.0774345,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /var/workdir/source&#34;}&#xA;Merge option disabled. Using checked-out revision ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 directly.&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-clone-repository-pod | container step-symlink-check: &#xA;Running symlink check&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-clone-repository-pod | container step-create-trusted-artifact: &#xA;Prepared artifact from /var/workdir/source (sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c)&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Executing: oras push --annotation=quay.expires-after=6h --registry-config /tmp/create-oci.sh.ffUhFN/auth-7J8tBo.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1.git SOURCE_ARTIFACT&#xA;Uploading f56d2ebf627f SOURCE_ARTIFACT&#xA;Uploaded  f56d2ebf627f SOURCE_ARTIFACT&#xA;Pushed [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1.git&#xA;ArtifactType: application/vnd.unknown.artifact.v1&#xA;Digest: sha256:6b56ff99f1ce06e053ada541ae22f40591c442b87095db2c928dce644ef4562f&#xA;Artifacts created&#xA;&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-init-pod | init container: prepare&#xA;2026/05/12 10:37:30 Entrypoint initialization&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-init-pod | container step-init: &#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-12T10:37:33Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | init container: prepare&#xA;2026/05/12 10:37:50 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | init container: place-scripts&#xA;2026/05/12 10:37:50 Decoded script /tekton/scripts/script-0-bxgm5&#xA;2026/05/12 10:37:50 Decoded script /tekton/scripts/script-2-4vx7h&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | container step-skip-ta: &#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | container step-use-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | container step-prefetch-dependencies: &#xA;Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;Using mounted service CA bundle: /mnt/service-ca/ca-bundle.crt&#xA;&#39;/mnt/service-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/service-ca.crt&#39;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=debug msg=&#34;Starting prefetch-dependencies&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;Not using package registry proxy because allow-package-registry-proxy is not set to `true` on the cluster level&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] source-dir: /var/workdir/source&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] output-dir: /var/workdir/cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] sbom-format: spdx&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] mode: strict&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] output-dir-mount-point: /cachi2/output&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] env-files: [/var/workdir/cachi2/cachi2.env /var/workdir/cachi2/prefetch.env /var/workdir/cachi2/prefetch-env.json]&#34;&#xA;time=&#34;2026-05-12T10:38:00Z&#34; level=info msg=&#34;[param] git-auth-directory: /workspace/git-basic-auth&#34;&#xA;time=&#34;2026-05-12T10:38:01Z&#34; level=info msg=&#34;hermeto [stdout] hermeto 0.51.0&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:38:01Z&#34; level=warning msg=&#34;No input provided; skipping prefetch-dependencies&#34; logger=PrefetchDependencies&#xA;time=&#34;2026-05-12T10:38:01Z&#34; level=debug msg=&#34;Finished prefetch-dependencies&#34;&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-prefetch-dependencies-pod | container step-create-trusted-artifact: &#xA;WARN: found skip file in /var/workdir/source&#xA;WARN: found skip file in /var/workdir/cachi2&#xA;&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-push-dockerfile-pod | init container: prepare&#xA;2026/05/12 10:40:17 Entrypoint initialization&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-push-dockerfile-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.UQuLK3/auth-uXQaFK.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c to /var/workdir/source&#xA;&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-push-dockerfile-pod | container step-push: &#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] image-digest: sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] containerfile: docker/Dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] context: .&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] tag-suffix: .dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] artifact-type: application/vnd.konflux.dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] source: source&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] result-path-image-ref: /tekton/results/IMAGE_REF&#34;&#xA;time=&#34;2026-05-12T10:40:21Z&#34; level=info msg=&#34;[param] alternative-filename: Dockerfile&#34;&#xA;time=&#34;2026-05-12T10:40:22Z&#34; level=info msg=&#34;oras [stdout] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:204605930ca7f96918407bd294bf0166847f38b4c8076a229ded48973cc5a1d3&#34; logger=CliExecutor&#xA;time=&#34;2026-05-12T10:40:22Z&#34; level=info msg=&#34;Containerfile &#39;/var/workdir/source/docker/Dockerfile&#39; is pushed to registry with tag: sha256-80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9.dockerfile&#34;&#xA;{&#34;image_ref&#34;:&#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:204605930ca7f96918407bd294bf0166847f38b4c8076a229ded48973cc5a1d3&#34;}&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-rpms-signature-scan-pod | init container: prepare&#xA;2026/05/12 10:40:17 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-rpms-signature-scan-pod | init container: place-scripts&#xA;2026/05/12 10:40:20 Decoded script /tekton/scripts/script-0-rtgbf&#xA;2026/05/12 10:40:20 Decoded script /tekton/scripts/script-1-787v2&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-rpms-signature-scan-pod | container step-rpms-signature-scan: &#xA;+ set -o pipefail&#xA;+ rpm_verifier --image-url quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1 --image-digest sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9 --workdir /tmp&#xA;Image: quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#xA;No unsigned RPMs found&#xA;&#xA;{&#39;keys&#39;: {&#39;unsigned&#39;: 0}}&#xA;====================================&#xA;&#xA;Final results:&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;Images processed:&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;, &#34;digests&#34;: [&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;]}}&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-rpms-signature-scan-pod | container step-output-results: &#xA;+ source /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;++ cat /tmp/status&#xA;+ status=SUCCESS&#xA;++ cat /tmp/results&#xA;+ rpms_data=&#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;++ cat /tmp/images_processed&#xA;+ images_processed=&#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;, &#34;digests&#34;: [&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;]}}&#39;&#xA;+ &#39;[&#39; SUCCESS == ERROR &#39;]&#39;&#xA;+ note=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task rpms-signature-scan completed successfully&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:16+00:00 --arg result SUCCESS --arg note &#39;Task rpms-signature-scan completed successfully&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:16+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:16+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ TEST_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:16+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:16+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:16+00:00&#34;,&#34;note&#34;:&#34;Task rpms-signature-scan completed successfully&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ echo &#39;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#39;&#xA;+ tee /tekton/results/RPMS_DATA&#xA;{&#34;keys&#34;: {&#34;unsigned&#34;: 0}}&#xA;+ echo &#39;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;, &#34;digests&#34;: [&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;]}}&#39;&#xA;+ tee /tekton/results/IMAGES_PROCESSED&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#34;, &#34;digests&#34;: [&#34;sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#34;]}}&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-sast-unicode-check-pod | init container: prepare&#xA;2026/05/12 10:40:15 Entrypoint initialization&#xA;&#xA; pod: test-comp-zsrs-on-pull-request-w5s5g-sast-unicode-check-pod | init container: place-scripts&#xA;2026/05/12 10:40:17 Decoded script /tekton/scripts/script-1-2hmwb&#xA;2026/05/12 10:40:17 Decoded script /tekton/scripts/script-2-8khn4&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-sast-unicode-check-pod | container step-use-trusted-artifact: &#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Executing: oras blob fetch --registry-config /tmp/use-oci.sh.ynCGUF/auth-XsjrI3.json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c --output -&#xA;Restored artifact quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs@sha256:f56d2ebf627f406936b54b257592530108e394feaf29133ec3940180bcfc337c to /var/workdir/source&#xA;WARN: artifact URI not provided, (given: =/var/workdir/cachi2)&#xA;&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-sast-unicode-check-pod | container step-sast-unicode-check: &#xA;+ . /utils.sh&#xA;++ OPM_RENDER_CACHE=/tmp/konflux-test-opm-cache&#xA;++ DEFAULT_INDEX_IMAGE=registry.redhat.io/redhat/redhat-operator-index&#xA;+ trap &#39;handle_error /tekton/results/TEST_OUTPUT&#39; EXIT&#xA;+ [[ -z &#39;&#39; ]]&#xA;+ PROJECT_NAME=test-comp-zsrs&#xA;+ echo &#39;INFO: The PROJECT_NAME used is: test-comp-zsrs&#39;&#xA;INFO: The PROJECT_NAME used is: test-comp-zsrs&#xA;+ ca_bundle=/mnt/trusted-ca/ca-bundle.crt&#xA;+ &#39;[&#39; -f /mnt/trusted-ca/ca-bundle.crt &#39;]&#39;&#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;+ echo &#39;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#39;&#xA;+ cp -vf /mnt/trusted-ca/ca-bundle.crt /etc/pki/ca-trust/source/anchors&#xA;&#39;/mnt/trusted-ca/ca-bundle.crt&#39; -&gt; &#39;/etc/pki/ca-trust/source/anchors/ca-bundle.crt&#39;&#xA;+ update-ca-trust&#xA;+ SCAN_PROP=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58&#xA;+ FUC_EXIT_CODE=0&#xA;+ declare -a ALL_TARGETS&#xA;+ OLD_IFS=&#39; &#x9;&#xA;&#39;&#xA;+ IFS=,&#xA;+ for d in $TARGET_DIRS&#xA;+ ALL_TARGETS+=(&#34;${SOURCE_CODE_DIR}/source/${d}&#34;)&#xA;+ IFS=&#39; &#x9;&#xA;&#39;&#xA;+ LANG=en_US.utf8&#xA;+ find_unicode_control.py -p bidi -v -d -t /var/workdir/source/.&#xA;+ [[ 0 -ne 0 ]]&#xA;+ sed -i raw_sast_unicode_check_out.txt -E -e &#39;s|(.*:[0-9]+)(.*)|\1: warning:\2|&#39; -e &#39;s|^|Error: UNICONTROL_WARNING:\n|&#39;&#xA;+ CSGERP_OPTS=(--mode=json --remove-duplicates --embed-context=3 --set-scan-prop=&#34;${SCAN_PROP}&#34; --strip-path-prefix=&#34;${SOURCE_CODE_DIR}&#34;/source/)&#xA;+ csgrep --mode=json --remove-duplicates --embed-context=3 --set-scan-prop=https://github.com/siddhesh/find-unicode-control.git#c2accbfbba7553a8bc1ebd97089ae08ad8347e58 --strip-path-prefix=/var/workdir/source/ raw_sast_unicode_check_out.txt&#xA;+ csgrep --mode=evtstat processed_sast_unicode_check_out.json&#xA;+ [[ SITE_DEFAULT == \S\I\T\E\_\D\E\F\A\U\L\T ]]&#xA;+ KFP_GIT_URL=https://gitlab.cee.redhat.com/osh/known-false-positives.git&#xA;+ PROBE_URL=https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;+ KFP_DIR=known-false-positives&#xA;+ KFP_CLONED=0&#xA;+ mkdir known-false-positives&#xA;+ [[ -n https://gitlab.cee.redhat.com/osh/known-false-positives.git ]]&#xA;+ echo -n &#39;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... &#39;&#xA;INFO: Probing https://gitlab.cee.redhat.com/osh/known-false-positives... + curl --fail --head --max-time 60 --no-progress-meter https://gitlab.cee.redhat.com/osh/known-false-positives&#xA;++ head -1&#xA;curl: (6) Could not resolve host: gitlab.cee.redhat.com&#xA;+ [[ 0 -eq 0 ]]&#xA;+ echo &#39;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#39;&#xA;WARN: Failed to clone known-false-positives at https://gitlab.cee.redhat.com/osh/known-false-positives.git, scan results will not be filtered&#xA;+ mv processed_sast_unicode_check_out.json sast_unicode_check_out.json&#xA;+ csgrep --mode=sarif sast_unicode_check_out.json&#xA;+ [[ 0 -eq 0 ]]&#xA;+ note=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ make_result_json -r SUCCESS -t &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ local RESULT=&#xA;++ local SUCCESSES=0&#xA;++ local FAILURES=0&#xA;++ local WARNINGS=0&#xA;++ local &#39;NOTE=For details, check Tekton task log.&#39;&#xA;++ local NAMESPACE=default&#xA;++ local OUTPUT&#xA;++ local OPTIND opt&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ RESULT=SUCCESS&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ case &#34;${opt}&#34; in&#xA;++ NOTE=&#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39;&#xA;++ getopts :r:s:f:w:t:n: opt&#xA;++ shift 4&#xA;++ &#39;[&#39; -z SUCCESS &#39;]&#39;&#xA;++ case &#34;${RESULT}&#34; in&#xA;++++ date -u --iso-8601=seconds&#xA;+++ jq -rce --arg date 2026-05-12T10:42:04+00:00 --arg result SUCCESS --arg note &#39;Task sast-unicode-check-oci-ta success: No finding was detected&#39; --arg namespace default --arg successes 0 --arg failures 0 --arg warnings 0 --null-input &#39;{  result: $result,&#xA;        timestamp: $date,&#xA;        note: $note,&#xA;        namespace: $namespace,&#xA;        successes: $successes|tonumber,&#xA;        failures: $failures|tonumber,&#xA;        warnings: $warnings|tonumber&#xA;    }&#39;&#xA;++ OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:04+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;++ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:04+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ ERROR_OUTPUT=&#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:04+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ echo &#39;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:04+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#39;&#xA;+ tee /tekton/results/TEST_OUTPUT&#xA;{&#34;result&#34;:&#34;SUCCESS&#34;,&#34;timestamp&#34;:&#34;2026-05-12T10:42:04+00:00&#34;,&#34;note&#34;:&#34;Task sast-unicode-check-oci-ta success: No finding was detected&#34;,&#34;namespace&#34;:&#34;default&#34;,&#34;successes&#34;:0,&#34;failures&#34;:0,&#34;warnings&#34;:0}&#xA;+ handle_error /tekton/results/TEST_OUTPUT&#xA;+ exit_code=0&#xA;+ &#39;[&#39; 0 -ne 0 &#39;]&#39;&#xA;+ exit 0&#xA;&#xA;pod: test-comp-zsrs-on-pull-request-w5s5g-sast-unicode-check-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs&#xA;Attaching to quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1&#xA;Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/sarif+json quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9 sast_unicode_check_out.sarif:application/sarif+json&#xA;Preparing sast_unicode_check_out.sarif&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading 0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploaded  0e9806f310b4 sast_unicode_check_out.sarif&#xA;Uploading b0f5b0026505 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  b0f5b0026505 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/build-e2e-tgct/test-comp-zsrs:on-pr-ec282e7ce4aa8bfb9a64129138b7ffaaaf55d5c1@sha256:80f40b59133852fce5d775f202ea1f738b147f60641b42a507c36910f5fc0ac9&#xA;Digest: sha256:b0f5b00265056fc7cd5a06e617509cd549e16e77908b99bf054850a71276796b&#xA;No excluded-findings.json exists. Skipping upload.&#xA;New PipelineRun test-comp-zsrs-on-pull-request-bk4r7 found after retrigger for component build-e2e-tgct/test-comp-zsrs&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 found for Component build-e2e-tgct/test-comp-zsrs&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: ResolvingTaskRef&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Running&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Completed&#xA;&lt; Exit [It] should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:356 @ 05/12/26 10:58:48.546 (3m15.191s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:48.546&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:48.546 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="4.787544124">
              <system-err>&gt; Enter [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:58:48.547&#xA;&lt; Exit [It] should push Dockerfile to registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:366 @ 05/12/26 10:58:53.334 (4.787s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.334&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.334 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.000479881">
              <skipped message="skipped - floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic"></skipped>
              <system-err>&gt; Enter [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:58:53.335&#xA;[SKIPPED] floating tag validation is not needed for: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:380 @ 05/12/26 10:58:53.335&#xA;&lt; Exit [It] floating tags are created successfully - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:378 @ 05/12/26 10:58:53.335 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.335&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.335 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.310611923">
              <system-err>&gt; Enter [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:58:53.336&#xA;&lt; Exit [It] image manifest mediaType is correct - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:395 @ 05/12/26 10:58:53.646 (310ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.646&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.646 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.015397678">
              <skipped message="skipped - Skipping source image check since it is not enabled in the pipeline"></skipped>
              <system-err>&gt; Enter [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:58:53.647&#xA;Source build is enabled: false&#xA;[SKIPPED] Skipping source image check since it is not enabled in the pipeline&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:440 @ 05/12/26 10:58:53.662&#xA;&lt; Exit [It] check for source images if enabled in pipeline - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:420 @ 05/12/26 10:58:53.662 (15ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.662&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.662 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.203358726">
              <system-err>&gt; Enter [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:58:53.663&#xA;&lt; Exit [BeforeAll] when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:477 @ 05/12/26 10:58:53.758 (95ms)&#xA;&gt; Enter [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:58:53.758&#xA;records for PipelineRun test-comp-zsrs-on-pull-request-bk4r7:&#xA;&amp;{[{build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/8b1b295a-224b-4494-a6bf-8a739475125f 0030c79e-b110-4048-86a1-9fdf200acfc5 0030c79e-b110-4048-86a1-9fdf200acfc5} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/7cfcf142-0364-40e7-a9a1-1e12249d088b 0791b098-ffaf-4afe-bb77-f1043d0064d9 0791b098-ffaf-4afe-bb77-f1043d0064d9} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/792ef8d3-a10f-4ab0-b2af-ebf740a6b094 702ff3e6-0bc7-4c1e-a237-ba174aba2922 702ff3e6-0bc7-4c1e-a237-ba174aba2922} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/5f2e1176-3ffd-4097-8875-65ce1f152ec1 72619488-c146-4c8d-96d1-367108f3c19e 72619488-c146-4c8d-96d1-367108f3c19e} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/6f51495f-e46f-465c-8dae-578cc95e8f37 893fb0c2-0dd9-4ce3-8e20-e5353ad75737 893fb0c2-0dd9-4ce3-8e20-e5353ad75737} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/cac6658b-b375-447a-81c5-f571a46b322a 8e50895a-df2a-4ae1-b261-e2ccfe572421 8e50895a-df2a-4ae1-b261-e2ccfe572421} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/ad8b70e7-0c6f-46af-a05f-8715eaca6057 9b5406eb-1de1-4b90-b89e-29c127bc375c 9b5406eb-1de1-4b90-b89e-29c127bc375c} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/0ace1c54-2270-4ce2-bb84-8ef719680bd3 bca08a79-e19a-405b-836b-7813bbed8cbe bca08a79-e19a-405b-836b-7813bbed8cbe} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/3f6fa77e-26a9-422e-baf3-b0ad249db337 c51daf87-1166-4b26-8c75-3731be575aef c51daf87-1166-4b26-8c75-3731be575aef} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/58b0af04-d5dd-4155-af6d-cd51e617853b c5f020bc-219f-4be0-8496-7df92cb52cb9 c5f020bc-219f-4be0-8496-7df92cb52cb9} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/2995f081-f7ad-4aae-9f69-3f52deb41c19 d8abc4ff-441f-44fd-88b4-12595cc1859f d8abc4ff-441f-44fd-88b4-12595cc1859f} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/886e39bf-1f85-47ad-9631-22bea49e58c4 dc56349c-99ef-46a7-9603-9af82e48e078 dc56349c-99ef-46a7-9603-9af82e48e078} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/252b3af2-0a10-4f78-b743-ed64d0a6dca6 e5bafb81-e4be-4619-ae10-fc1ed46b2f7c e5bafb81-e4be-4619-ae10-fc1ed46b2f7c} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/e491cac8-f9e7-4279-a01d-cf2313b6f9bb e70aba61-dd76-477d-9c5a-3be8311afc1d e70aba61-dd76-477d-9c5a-3be8311afc1d} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/da26af6f-291e-4b2a-8f44-9c3386b66cc6 f5a45571-e59f-47d5-be59-5ddb1bc854c7 f5a45571-e59f-47d5-be59-5ddb1bc854c7} {build-e2e-tgct/results/549d7915-76e0-484a-a8d5-6dbb08736c9e/records/549d7915-76e0-484a-a8d5-6dbb08736c9e f9da384c-6dd6-4c62-8b24-7d4ff2215797 f9da384c-6dd6-4c62-8b24-7d4ff2215797}]}&#xA;&lt; Exit [It] should have Pipeline Records - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:498 @ 05/12/26 10:58:53.866 (108ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.866&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:53.866 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="0.254356447">
              <system-err>&gt; Enter [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:58:53.867&#xA;&lt; Exit [It] should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:540 @ 05/12/26 10:58:54.121 (254ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:54.121&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:58:54.121 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="21.50145232">
              <system-err>&gt; Enter [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:58:54.121&#xA;&lt; Exit [BeforeAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:550 @ 05/12/26 10:58:54.13 (9ms)&#xA;&gt; Enter [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:58:54.13&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-wbvgx&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-wbvgx&#34; to finish&#xA;&lt; Exit [It] verify-enterprise-contract check should pass - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:567 @ 05/12/26 10:59:15.622 (21.492s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:15.623&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:15.623 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0.039420367">
              <skipped message="skipped - Hermetic build is not enabled, skipping the test"></skipped>
              <system-err>&gt; Enter [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:59:15.624&#xA;[SKIPPED] Hermetic build is not enabled, skipping the test&#xA;In [It] at: /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:661 @ 05/12/26 10:59:15.624&#xA;&lt; Exit [It] should have Hermeto content in the SBOM in case the build was hermetic - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:659 @ 05/12/26 10:59:15.624 (0s)&#xA;&gt; Enter [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:59:15.624&#xA;&lt; Exit [AfterAll] when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:555 @ 05/12/26 10:59:15.663 (39ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:15.663&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:15.663 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="22.478981332">
              <system-err>&gt; Enter [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:59:15.663&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 found for Component build-e2e-tgct/test-comp-zsrs&#xA;PipelineRun test-comp-zsrs-on-pull-request-bk4r7 reason: Completed&#xA;&lt; Exit [BeforeAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:706 @ 05/12/26 10:59:15.871 (208ms)&#xA;&gt; Enter [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:59:15.872&#xA;Creating Pipeline &#34;ec-integration-test-scenario-run-hgqnd&#34;&#xA;Waiting for pipeline &#34;ec-integration-test-scenario-run-hgqnd&#34; to finish&#xA;The PipelineRun ec-integration-test-scenario-run-hgqnd in namespace build-e2e-tgct has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 59, 37, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;Tasks Completed: 2 (Failed: 0, Cancelled 0), Skipped: 0&#34;}}&#xA;EC PipelineRun ec-integration-test-scenario-run-hgqnd has labels: map[build.appstudio.redhat.com/pipeline:enterprise-contract kueue.x-k8s.io/priority-class:konflux-default kueue.x-k8s.io/queue-name:pipelines-queue tekton.dev/pipeline:enterprise-contract]&#xA;The TaskRun ec-integration-test-scenario-run-hgqnd-verify of PipelineRun ec-integration-test-scenario-run-hgqnd  has status.conditions: &#xA;v1.Conditions{apis.Condition{Type:&#34;Succeeded&#34;, Status:&#34;True&#34;, Severity:&#34;&#34;, LastTransitionTime:apis.VolatileTime{Inner:time.Date(2026, time.May, 12, 10, 59, 37, 0, time.Local)}, Reason:&#34;Succeeded&#34;, Message:&#34;All Steps have completed executing&#34;}}&#xA;got step-summary log: {&#xA;  &#34;timestamp&#34;: &#34;1778583575&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 21,&#xA;  &#34;failures&#34;: 0,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;SUCCESS&#34;&#xA;}&#xA;&#xA;&lt; Exit [It] runs ec pipeline pipelines/enterprise-contract.yaml - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:741 @ 05/12/26 10:59:38.091 (22.219s)&#xA;&gt; Enter [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:59:38.091&#xA;&lt; Exit [AfterAll] build-definitions ec pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:726 @ 05/12/26 10:59:38.142 (51ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:38.142&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:38.142 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="passed" time="7.959808438">
              <system-err>&gt; Enter [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:813 @ 05/12/26 10:59:38.143&#xA;PipelineRun test-symlink-comp-cnrr-on-pull-request-k88qq found for Component build-e2e-tgct/test-symlink-comp-cnrr&#xA;PipelineRun test-symlink-comp-cnrr-on-pull-request-k88qq reason: Failed&#xA;attempt 1/1: PipelineRun &#34;test-symlink-comp-cnrr-on-pull-request-k88qq&#34; failed: &#xA; pod: test-symlink-comp-cnrr-on-pd1f8635e7845addcc7af2f872a5766e7-pod | init container: prepare&#xA;2026/05/12 10:37:56 Entrypoint initialization&#xA;&#xA; pod: test-symlink-comp-cnrr-on-pd1f8635e7845addcc7af2f872a5766e7-pod | init container: place-scripts&#xA;2026/05/12 10:37:57 Decoded script /tekton/scripts/script-0-vv5jq&#xA;2026/05/12 10:37:57 Decoded script /tekton/scripts/script-1-sm67f&#xA;&#xA;pod: test-symlink-comp-cnrr-on-pd1f8635e7845addcc7af2f872a5766e7-pod | container step-clone: &#xA;INFO: Using mounted CA bundle: /mnt/trusted-ca/ca-bundle.crt&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582284.4613564,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582284.690552,&#34;caller&#34;:&#34;git/git.go:223&#34;,&#34;msg&#34;:&#34;Successfully cloned https://github.com/redhat-appstudio-qe/devfile-sample-python-basic @ 535204151df4311d6d8f00b8f983a2e97f970787 (grafted, HEAD) in path /workspace/output/source&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582284.6906374,&#34;caller&#34;:&#34;git/git.go:394&#34;,&#34;msg&#34;:&#34;Retrying operation (attempt 1)&#34;}&#xA;{&#34;level&#34;:&#34;info&#34;,&#34;ts&#34;:1778582284.715644,&#34;caller&#34;:&#34;git/git.go:277&#34;,&#34;msg&#34;:&#34;Successfully initialized and updated submodules in path /workspace/output/source&#34;}&#xA;Merge option disabled. Using checked-out revision 535204151df4311d6d8f00b8f983a2e97f970787 directly.&#xA;&#xA;pod: test-symlink-comp-cnrr-on-pd1f8635e7845addcc7af2f872a5766e7-pod | container step-symlink-check: &#xA;Running symlink check&#xA;The cloned repository contains symlink pointing outside of the cloned repository: /workspace/output/source/os-release-symlink&#xA;&#xA; pod: test-symlink-comp-cnrr-on-pull-request-k88qq-init-pod | init container: prepare&#xA;2026/05/12 10:37:41 Entrypoint initialization&#xA;&#xA;pod: test-symlink-comp-cnrr-on-pull-request-k88qq-init-pod | container step-init: &#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-12T10:37:47Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&lt; Exit [It] pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-cnrr - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:813 @ 05/12/26 10:59:38.419 (276ms)&#xA;&gt; Enter [AfterAll] HACBS pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:271 @ 05/12/26 10:59:38.419&#xA;&lt; Exit [AfterAll] HACBS pipelines - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:271 @ 05/12/26 10:59:46.102 (7.683s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:46.103&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.65zYiiyd8W/tests/build/build_templates.go:207 @ 05/12/26 10:59:46.103 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when backing up tenant data before upgrade should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when upgrading Konflux to the new version should upgrade the cluster and verify Velero survived [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when backing up tenant data should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if release CR is created [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies the release pipelinerun is running and succeeds [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if the Release exists in github repo [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that Release PipelineRun should eventually succeed [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification tests if the image was pushed to quay [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release is marked as succeeded. [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that Tenant PipelineRun is triggered [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release is marked as succeeded. [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the release CR is created [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the multiarch release pipelinerun is running and succeeds [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies if the chains controller is running [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies the signing secret is present [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task creates signature and attestation [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task succeeds when policy is met [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task does not pass when tests are not satisfied on non-strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when tests are not satisfied on strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when unexpected signature is used [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec cli has error handling [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec validate accepts a list of image references [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies redhat products pass the redhat policy rule collection before release  [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task are trusted [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task references are pinned [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if release CR is created [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies the advs release pipelinerun is running and succeeds [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Release PipelineRun is triggered [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Enterprise Contract Task has succeeded in the Release PipelineRun [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release is marked as succeeded. [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification verifies that the ReleasePlan CR is unmatched in the beginning [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates ReleasePlanAdmission CR in corresponding managed namespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlanAdmission CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates a manual release ReleasePlan CR in devNamespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the second ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes one ReleasePlan CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when One ReleasePlan CR is deleted in managed namespace verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes the ReleasePlanAdmission CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is deleted in managed namespace verifies that the ReleasePlan CR has no matched ReleasePlanAdmission [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context points to a file [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles from specific context [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context is the root directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when context points to a file and a directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when using negation [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding HOME environment variable [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding STEP image [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR is created for the Snapshot [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification verifies a release PipelineRun is started and succeeded in managed namespace [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validate the result of task create-pyxis-image contains image ids [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR has completed [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validates that imageIds from task create-pyxis-image exist in Pyxis. [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] Verify AppStudioProvisionedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioDeactivatedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioBannedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created verifies if the build PipelineRun contains the finalizer [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created waits for build PipelineRun to succeed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded verifies that the finalizer has been removed from the build pipelinerun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if all of the integrationPipelineRuns passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the passed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates a ReleasePlan [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if the global candidate is updated after push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if all of the integrationPipelineRuns created by push event passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if a Release is created successfully [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if all of the integrationPipelineRuns finished [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the failed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if snapshot is marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates a new IntegrationTestScenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail updates the Snapshot with the re-run label for the new scenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the new integration pipelineRun started [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the re-run label was removed from the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if all integration pipelineRuns finished successfully [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the name of the re-triggered pipelinerun is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if snapshot is still marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot of push event is created checks no Release CRs are created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the release CR is created [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies the rhio release pipelinerun is running and succeeds [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the MR URL is valid [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] post-release verification. block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negBlockReleases]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should have a related PaC init PR created [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created initialized integration test status is reported to github [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the Snapshot was created should find both the related Integration PipelineRuns [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns are created should eventually complete successfully [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully should lead to Snapshot CR being marked as failed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the successful Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the optional Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the warning Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully merging the PR, expected to succeed  [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully leads to triggering a push PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully verifies that Push PipelineRuns completed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when The git-provider annotation is missing should set the git-reporting-failure annotation correctly [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun is created but fails [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun failure is reported to integration test checkRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-nfvcxt [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-nfvcxt [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-nfvcxt [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-rpzpac [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-rpzpac [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-rpzpac [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created test that cleanup happened successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created triggers a Build PipelineRun [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should have a related PaC init MR is created [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully for component  [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the Snapshot was created should find the Integration Test Scenario PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates at least one MR note contains the final integration test result [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created merging the PR should be successful [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created leads to triggering on push PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an application [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an IntegrationTestScenario for the app [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates new branch for the build [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created triggers creation of a PR in the sample repo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created verifies component build status [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created does not contain an annotation with a Snapshot Name [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate Tekton TaskRun test results successfully [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is signed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Snapshot CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is annotated with the name of the Snapshot [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Integration Test PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when push pipelinerun is retriggered should eventually succeed [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should lead to Snapshot CR being marked as passed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should trigger creation of Release CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release CR is created triggers creation of Release PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is triggered should eventually succeed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is completed should lead to Release CR being marked as succeeded [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the release CR is created [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies the rhtap release pipelinerun is running and succeeds [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the PR in infra-deployments repo is created/updated [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A creates the Component A successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A triggers a Build PipelineRun for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to build PipelineRunA finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to a PaC PR creation for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B creates the Component B successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B triggers a Build PipelineRun for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to a PaC PR creation for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C creates the Component C successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C triggers a Build PipelineRun for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to a PaC PR creation for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the root folder [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the multiple-repo [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for the last components build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for all component snapshots to be created with proper PR group annotations [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged get all group snapshots and check if pr-group annotation contains all components [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged make sure that group snapshot contains last build pipelinerun for each component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created make change to the multiple-repo to trigger a new cycle of testing [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created wait for the components A and B build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all component snapshots for component A and check if older snapshot has been cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all group snapshots and check if older group snapshot is cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that ResolutionRequest is deleted after pipeline resolution [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that no orphaned ResolutionRequests remain in namespace after test completion [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when IntegrationTestScenario reference to task as pipelinerun resolution trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
      </testsuite>
  </testsuites>