<?xml version="1.0" encoding="UTF-8"?>
  <testsuites tests="469" disabled="325" errors="1" failures="12" time="5265.689011194">
      <testsuite name="Red Hat App Studio E2E tests" package="/tmp/tmp.5k64aXXzs4/cmd" tests="469" disabled="82" skipped="243" errors="1" failures="12" time="5265.689011194" timestamp="2026-05-18T22:53:19">
          <properties>
              <property name="SuiteSucceeded" value="false"></property>
              <property name="SuiteHasProgrammaticFocus" value="false"></property>
              <property name="SpecialSuiteFailureReason" value="Suite Timeout Elapsed"></property>
              <property name="SuiteLabels" value="[]"></property>
              <property name="SuiteSemVerConstraints" value="[]"></property>
              <property name="SuiteComponentSemVerConstraints" value="[]"></property>
              <property name="RandomSeed" value="1779143742"></property>
              <property name="RandomizeAllSpecs" value="false"></property>
              <property name="LabelFilter" value=""></property>
              <property name="SemVerFilter" value=""></property>
              <property name="FocusStrings" value=""></property>
              <property name="SkipStrings" value=""></property>
              <property name="FocusFiles" value=""></property>
              <property name="SkipFiles" value=""></property>
              <property name="FailOnPending" value="false"></property>
              <property name="FailOnEmpty" value="false"></property>
              <property name="FailFast" value="false"></property>
              <property name="FlakeAttempts" value="0"></property>
              <property name="DryRun" value="false"></property>
              <property name="ParallelTotal" value="20"></property>
              <property name="OutputInterceptorMode" value="none"></property>
          </properties>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build annotations when component is created with invalid build request annotations handles invalid request annotation [build-service, github, annotations]" classname="Red Hat App Studio E2E tests" status="passed" time="111.927936252">
              <system-err>&gt; Enter [BeforeAll] test build annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:35 @ 05/18/26 22:53:19.458&#xA;&lt; Exit [BeforeAll] test build annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:35 @ 05/18/26 22:53:59.255 (39.798s)&#xA;&gt; Enter [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:69 @ 05/18/26 22:53:59.256&#xA;&lt; Exit [BeforeAll] when component is created with invalid build request annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:69 @ 05/18/26 22:54:09.306 (10.05s)&#xA;&gt; Enter [It] handles invalid request annotation - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:89 @ 05/18/26 22:54:09.306&#xA;build status annotation value: {&#34;message&#34;:&#34;unexpected build request: foo&#34;}&#xA;&lt; Exit [It] handles invalid request annotation - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:89 @ 05/18/26 22:55:09.323 (1m0.017s)&#xA;&gt; Enter [AfterAll] test build annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:51 @ 05/18/26 22:55:09.323&#xA;&lt; Exit [AfterAll] test build annotations - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:51 @ 05/18/26 22:55:11.385 (2.062s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:24 @ 05/18/26 22:55:11.385&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/annotations.go:24 @ 05/18/26 22:55:11.386 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that Release PipelineRun should eventually succeed [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification tests if the image was pushed to quay [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite Push to external registry] Post-release verification verifies that a Release is marked as succeeded. [release-pipelines, push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="passed" time="7.605116156">
              <system-err>&gt; Enter [BeforeAll] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:48 @ 05/18/26 23:46:22.505&#xA;STEP: Validating OADP operator health: pods running in openshift-adp - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/18/26 23:46:24.14&#xA;STEP: Validating Velero readiness: deployment has ready replicas - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/18/26 23:46:24.151&#xA;STEP: Validating BSL availability: at least one BackupStorageLocation is Available - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/18/26 23:46:24.159&#xA;STEP: Validating GitHub repo is reachable: https://github.com/redhat-appstudio-qe/DR_test_MathWizz - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/18/26 23:46:24.183&#xA;STEP: Validating repo structure: 3 component Dockerfiles exist - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:52 @ 05/18/26 23:46:24.183&#xA;STEP: Forking DR_test_MathWizz → DR-MathWizz-sgpnqo for tenant dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:55 @ 05/18/26 23:46:24.425&#xA;STEP: Forking DR_test_MathWizz → DR-MathWizz-tjbjah for tenant dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:55 @ 05/18/26 23:46:25.478&#xA;&lt; Exit [BeforeAll] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:48 @ 05/18/26 23:46:26.334 (3.829s)&#xA;&gt; Enter [It] should create both tenants concurrently - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:61 @ 05/18/26 23:46:26.335&#xA;STEP: Creating tenant namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:26.335&#xA;STEP: Creating tenant namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:26.335&#xA;STEP: Creating Application moshekipod-backwards-compat-dr in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.38&#xA;STEP: Creating Application kokohazamar-backwards-compat-dr in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.38&#xA;STEP: Creating Component mathwizz-web-server in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.418&#xA;STEP: Creating Component mathwizz-web-server in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.436&#xA;STEP: Creating Component mathwizz-history-worker in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.493&#xA;STEP: Creating Component mathwizz-history-worker in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.495&#xA;STEP: Creating Component mathwizz-frontend in namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.515&#xA;STEP: Creating Component mathwizz-frontend in namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.525&#xA;STEP: Creating managed namespace dr-test-moshekipod-backwards-compat-dr-managed for release pipelines - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.548&#xA;STEP: Creating managed namespace dr-test-kokohazamar-backwards-compat-dr-managed for release pipelines - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:27.56&#xA;STEP: Creating release pipeline ServiceAccount release-service-account in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.606&#xA;STEP: Creating release pipeline ServiceAccount release-service-account in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.616&#xA;STEP: Creating release pipeline RoleBinding in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.633&#xA;STEP: Creating release pipeline RoleBinding in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.644&#xA;STEP: Creating registry auth secrets in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.693&#xA;STEP: Creating registry auth secrets in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.693&#xA;STEP: Linking Quay auth secret to release SA in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.723&#xA;STEP: Linking Quay auth secret to release SA in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.724&#xA;STEP: Creating cosign signing secret in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.73&#xA;STEP: Creating cosign signing secret in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.731&#xA;STEP: Getting default Enterprise Contract policy from enterprise-contract-service namespace - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.75&#xA;STEP: Getting default Enterprise Contract policy from enterprise-contract-service namespace - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.757&#xA;STEP: Creating Enterprise Contract policy dr-ec-policy in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.766&#xA;STEP: Creating Enterprise Contract policy dr-ec-policy in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.766&#xA;STEP: Creating ReleasePlan dr-releaseplan in tenant namespace dr-test-moshekipod-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.778&#xA;STEP: Creating ReleasePlan dr-releaseplan in tenant namespace dr-test-kokohazamar-backwards-compat-dr - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.779&#xA;STEP: Creating ReleasePlanAdmission dr-releaseplanadmission in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.888&#xA;STEP: Creating ReleasePlanAdmission dr-releaseplanadmission in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.903&#xA;STEP: Creating release PVC dr-release-pvc in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.945&#xA;STEP: Creating release PVC dr-release-pvc in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.956&#xA;STEP: Creating secrets access Role in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.962&#xA;STEP: Creating secrets access RoleBinding in managed namespace dr-test-kokohazamar-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:29.972&#xA;STEP: Creating secrets access Role in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:30.063&#xA;STEP: Creating secrets access RoleBinding in managed namespace dr-test-moshekipod-backwards-compat-dr-managed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:68 @ 05/18/26 23:46:30.076&#xA;&lt; Exit [It] should create both tenants concurrently - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:61 @ 05/18/26 23:46:30.109 (3.775s)&#xA;&gt; Enter [AfterEach] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/18/26 23:46:30.11&#xA;&lt; Exit [AfterEach] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/18/26 23:46:30.11 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="timedout" time="2074.629369022">
              <failure message="A suite timeout occurred" type="timedout">[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/19/26 00:21:03.426&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed (Spec Runtime: 34m33.316s)&#xA;    /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;    In [It] (Node Runtime: 34m33.316s)&#xA;      /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;      At [By Step] Waiting for build PipelineRun for mathwizz-history-worker in dr-test-moshekipod-backwards-compat-dr (base: 0) (Step Runtime: 34m33.315s)&#xA;        /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196&#xA;&#xA;      Spec Goroutine&#xA;      goroutine 343 [sync.WaitGroup.Wait, 35 minutes]&#xA;        sync.runtime_SemacquireWaitGroup(0xc00189f680?, 0xc0?)&#xA;          /usr/lib/golang/src/runtime/sema.go:114&#xA;        sync.(*WaitGroup).Wait(0xc0018d0f90)&#xA;          /usr/lib/golang/src/sync/waitgroup.go:206&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains(0xc0006c3200, {0xc0009df140, 0x2, 0xc0007066a0?}, 0x0, 0x0)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:208&#xA;            | &#x9;}&#xA;            | }&#xA;            &gt; wg.Wait()&#xA;            | &#xA;            | // Release PipelineRuns run in the managed namespace and may not map 1:1&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.defineBackwardsCompatSpecs.func1.2.2()&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:75&#xA;            | &#xA;            | It(&#34;should wait for all build PipelineRuns to succeed&#34;, func() {&#xA;            &gt; &#x9;waitForPipelineChains(fw, bcTenants, nil, nil)&#xA;            | })&#xA;            | &#xA;        github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x3b7c660?, 0xc0008aa808?})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/node.go:585&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:946&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 79&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:911&#xA;&#xA;      Goroutines of Interest&#xA;      goroutine 345 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000162070, {0x4367ef0, 0xc001c8e520}, 0x1, {0xc001a46e40, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000162070, {0x4367ef0, 0xc001c8e520}, {0xc001a46e40, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3bc0fd1, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 347 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0008209a0, {0x4367ef0, 0xc0014a2e90}, 0x1, {0xc001bb0440, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0008209a0, {0x4367ef0, 0xc0014a2e90}, {0xc001bb0440, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3bb26b5, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 348 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0000000e0, {0x4367ef0, 0xc001b3a040}, 0x1, {0xc001d1c040, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0000000e0, {0x4367ef0, 0xc001b3a040}, {0xc001d1c040, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3bc0fd1, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 346 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0004cbdc0, {0x4367ef0, 0xc001c8e460}, 0x1, {0xc001a46dc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0004cbdc0, {0x4367ef0, 0xc001c8e460}, {0xc001a46dc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3baa855, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 344 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000209ab0, {0x4367ef0, 0xc001125450}, 0x1, {0xc0019f0780, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000209ab0, {0x4367ef0, 0xc001125450}, {0xc0019f0780, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3bb26b5, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 349 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000207030, {0x4367ef0, 0xc001c0a110}, 0x1, {0xc00194fdc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000207030, {0x4367ef0, 0xc001c0a110}, {0xc00194fdc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3baa855, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;</failure>
              <system-err>&gt; Enter [It] should wait for all build PipelineRuns to succeed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for per-component build → test chains across all tenants - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:75 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-frontend in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-frontend in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-web-server in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-web-server in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-history-worker in dr-test-kokohazamar-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;STEP: Waiting for build PipelineRun for mathwizz-history-worker in dr-test-moshekipod-backwards-compat-dr (base: 0) - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196 @ 05/18/26 23:46:30.111&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-moshekipod-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;namespace dr-test-kokohazamar-backwards-compat-dr: 0/1 build PipelineRuns succeeded&#xA;[TIMEDOUT] A suite timeout occurred&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/19/26 00:21:03.426&#xA;&#xA;This is the Progress Report generated when the suite timeout occurred:&#xA;  [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should wait for all build PipelineRuns to succeed (Spec Runtime: 34m33.316s)&#xA;    /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;    In [It] (Node Runtime: 34m33.316s)&#xA;      /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74&#xA;      At [By Step] Waiting for build PipelineRun for mathwizz-history-worker in dr-test-moshekipod-backwards-compat-dr (base: 0) (Step Runtime: 34m33.315s)&#xA;        /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:196&#xA;&#xA;      Spec Goroutine&#xA;      goroutine 343 [sync.WaitGroup.Wait, 35 minutes]&#xA;        sync.runtime_SemacquireWaitGroup(0xc00189f680?, 0xc0?)&#xA;          /usr/lib/golang/src/runtime/sema.go:114&#xA;        sync.(*WaitGroup).Wait(0xc0018d0f90)&#xA;          /usr/lib/golang/src/sync/waitgroup.go:206&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains(0xc0006c3200, {0xc0009df140, 0x2, 0xc0007066a0?}, 0x0, 0x0)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:208&#xA;            | &#x9;}&#xA;            | }&#xA;            &gt; wg.Wait()&#xA;            | &#xA;            | // Release PipelineRuns run in the managed namespace and may not map 1:1&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.defineBackwardsCompatSpecs.func1.2.2()&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:75&#xA;            | &#xA;            | It(&#34;should wait for all build PipelineRuns to succeed&#34;, func() {&#xA;            &gt; &#x9;waitForPipelineChains(fw, bcTenants, nil, nil)&#xA;            | })&#xA;            | &#xA;        github.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x3b7c660?, 0xc0008aa808?})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/node.go:585&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:946&#xA;        github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 79&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:911&#xA;&#xA;      Goroutines of Interest&#xA;      goroutine 345 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000162070, {0x4367ef0, 0xc001c8e520}, 0x1, {0xc001a46e40, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000162070, {0x4367ef0, 0xc001c8e520}, {0xc001a46e40, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3bc0fd1, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 347 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0008209a0, {0x4367ef0, 0xc0014a2e90}, 0x1, {0xc001bb0440, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0008209a0, {0x4367ef0, 0xc0014a2e90}, {0xc001bb0440, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3bb26b5, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 348 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0000000e0, {0x4367ef0, 0xc001b3a040}, 0x1, {0xc001d1c040, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0000000e0, {0x4367ef0, 0xc001b3a040}, {0xc001d1c040, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3bc0fd1, 0x17}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 346 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc0004cbdc0, {0x4367ef0, 0xc001c8e460}, 0x1, {0xc001a46dc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc0004cbdc0, {0x4367ef0, 0xc001c8e460}, {0xc001a46dc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3baa855, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 344 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000209ab0, {0x4367ef0, 0xc001125450}, 0x1, {0xc0019f0780, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000209ab0, {0x4367ef0, 0xc001125450}, {0xc0019f0780, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfef19, 0x27}, {0x3b7ec97, 0x5}, {0x3bb26b5, 0x13}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfef19, 0x27}, {0x3c23b33, 0x2f}, {0x3bdf37a, 0x1f}, {0x3bfb12b, 0x26}, {0xc001405fc8, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&#xA;      goroutine 349 [select]&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).match(0xc000207030, {0x4367ef0, 0xc001c0a110}, 0x1, {0xc00194fdc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:558&#xA;        github.com/onsi/gomega/internal.(*AsyncAssertion).Should(0xc000207030, {0x4367ef0, 0xc001c0a110}, {0xc00194fdc0, 0x4, 0x4})&#xA;          /opt/app-root/src/go/pkg/mod/github.com/onsi/gomega@v1.39.1/internal/async_assertion.go:145&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForSucceededPRCount(0xc0006c3200, {0x3bfb151, 0x26}, {0x3b7ec97, 0x5}, {0x3baa855, 0x11}, 0x1, 0x4e94914f000, 0x6fc23ac00)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:137&#xA;            | &#x9;&#x9;namespace, succeededCount, expectedCount, displayType)&#xA;            | &#x9;return succeededCount&#xA;            &gt; }, timeout, poll).Should(Equal(expectedCount),&#xA;            | &#x9;&#34;expected %d successful %s PipelineRuns in namespace %s&#34;,&#xA;            | &#x9;expectedCount, displayType, namespace)&#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains.func1({{0x3bfb151, 0x26}, {0x3c1eac3, 0x2e}, {0x3bdbce8, 0x1e}, {0x3bf752b, 0x25}, {0xc00117b290, 0x12}, ...}, ...)&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:198&#xA;            | By(fmt.Sprintf(&#34;Waiting for build PipelineRun for %s in %s (base: %d)&#34;,&#xA;            | &#x9;component.Name, tenant.Namespace, base.build))&#xA;            &gt; waitForSucceededPRCount(fw, tenant.Namespace, &#34;build&#34;, component.Name,&#xA;            | &#x9;base.build+1, PipelineTimeout, PipelinePoll)&#xA;            | &#xA;      &gt; github.com/konflux-ci/e2e-tests/tests/disaster-recovery.waitForPipelineChains in goroutine 343&#xA;          /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/tenant_application_lifecycle.go:189&#xA;            | for _, comp := range Components {&#xA;            | &#x9;wg.Add(1)&#xA;            &gt; &#x9;go func(tenant Tenant, component ComponentDef) {&#xA;            | &#x9;&#x9;defer GinkgoRecover()&#xA;            | &#x9;&#x9;defer wg.Done()&#xA;&lt; Exit [It] should wait for all build PipelineRuns to succeed - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:74 @ 05/19/26 00:21:03.427 (34m33.317s)&#xA;&gt; Enter [AfterEach] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/19/26 00:21:03.428&#xA;error getting logs for pod/container image-controller-image-pruner-cronjob-29652480-df4pk/image-pruner: error in opening the stream: container &#34;image-pruner&#34; in pod &#34;image-controller-image-pruner-cronjob-29652480-df4pk&#34; is waiting to start: CreateContainerConfigError&#xA;&lt; Exit [AfterEach] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:44 @ 05/19/26 00:21:03.702 (275ms)&#xA;&gt; Enter [AfterAll] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:153 @ 05/19/26 00:21:03.703&#xA;Deleting fork repo DR-MathWizz-sgpnqo for tenant dr-test-kokohazamar-backwards-compat-dr&#xA;Deleting fork repo DR-MathWizz-tjbjah for tenant dr-test-moshekipod-backwards-compat-dr&#xA;STEP: Collecting Velero pod information - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/19/26 00:21:04.703&#xA;Velero pod: node-agent-mkt62 | Phase: Running | Ready: true&#xA;Velero pod: node-agent-ssdmm | Phase: Running | Ready: true&#xA;Velero pod: node-agent-xs5mw | Phase: Running | Ready: true&#xA;Velero pod: velero-5498cfc4db-knvx9 | Phase: Running | Ready: true&#xA;STEP: Collecting Backup CR status for tenant &#34;dr-test-kokohazamar-backwards-compat-dr&#34; - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/19/26 00:21:04.714&#xA;WARNING: could not get Backup CR &#34;backup-kokohazamar-backwards-compat-dr&#34;: backups.velero.io &#34;backup-kokohazamar-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Restore CR status for tenant &#34;dr-test-kokohazamar-backwards-compat-dr&#34; - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/19/26 00:21:04.721&#xA;WARNING: could not get Restore CR &#34;restore-backup-kokohazamar-backwards-compat-dr&#34;: restores.velero.io &#34;restore-backup-kokohazamar-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Backup CR status for tenant &#34;dr-test-moshekipod-backwards-compat-dr&#34; - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/19/26 00:21:04.727&#xA;WARNING: could not get Backup CR &#34;backup-moshekipod-backwards-compat-dr&#34;: backups.velero.io &#34;backup-moshekipod-backwards-compat-dr&#34; not found&#xA;STEP: Collecting Restore CR status for tenant &#34;dr-test-moshekipod-backwards-compat-dr&#34; - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:156 @ 05/19/26 00:21:04.733&#xA;WARNING: could not get Restore CR &#34;restore-backup-moshekipod-backwards-compat-dr&#34;: restores.velero.io &#34;restore-backup-moshekipod-backwards-compat-dr&#34; not found&#xA;&lt; Exit [AfterAll] DR Backwards-Compat - /tmp/tmp.5k64aXXzs4/tests/disaster-recovery/dr_backwards_compat.go:153 @ 05/19/26 00:21:04.74 (1.037s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when creating tenants on the old Konflux version should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when backing up tenant data before upgrade should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when upgrading Konflux to the new version should upgrade the cluster and verify Velero survived [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when restoring tenants from backup on the new Konflux version should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Backwards-Compat when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should create both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should wait for all build PipelineRuns to succeed [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when creating tenants and running initial pipelines should merge PaC configuration PRs on forked repos [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when backing up tenant data should create backup CRs for both tenants concurrently [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when simulating disaster by deleting namespaces should delete both tenant namespaces [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-1 (KokoHazamar) via velero CLI method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when restoring from backup should restore tenant-2 (MosheKipod) via oc command method [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when performing post-restore recovery should rotate SA tokens on both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm structural integrity of both tenants [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [disaster-recovery DR Suite] DR Same-Version Backup/Restore when verifying restored tenants should confirm functional pipeline execution after restore [disaster-recovery, Serial]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] post-release verification. block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negBlockReleases]" classname="Red Hat App Studio E2E tests" status="passed" time="122.185325925">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:34 @ 05/18/26 22:53:19.356&#xA;&lt; Exit [BeforeAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:34 @ 05/18/26 22:54:17.645 (58.289s)&#xA;&gt; Enter [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:69 @ 05/18/26 22:54:17.645&#xA;&lt; Exit [It] block-releases true in ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:69 @ 05/18/26 22:54:18.42 (774ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:32 @ 05/18/26 22:54:18.42&#xA;&lt; Exit [AfterEach] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:32 @ 05/18/26 22:54:18.42 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:61 @ 05/18/26 22:54:18.42&#xA;&lt; Exit [AfterAll] [release-service-suite [RELEASE-2136] Release CR fails when block-releases true in ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/block_releases_release_plan_admission.go:61 @ 05/18/26 22:55:21.541 (1m3.121s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the release CR is created [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies the rhtap release pipelinerun is running and succeeds [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rhtap-service-push pipeline] Rhtap-service-push happy path Post-release verification verifies if the PR in infra-deployments repo is created/updated [release-pipelines, rhtap-service-push, RhtapServicePush]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="29.155622703">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:41 @ 05/18/26 22:53:19.557&#xA;snapshotPush.Name: %s snapshot-sample-qzan&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:41 @ 05/18/26 22:53:48.219 (28.662s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:110 @ 05/18/26 22:53:48.219&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:110 @ 05/18/26 22:53:48.712 (493ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:53:48.712&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:53:48.712 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that Tenant PipelineRun is triggered [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="40.06723918">
              <system-err>&gt; Enter [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:117 @ 05/18/26 22:53:48.713&#xA;PipelineRun has not been created yet for release %s/%s tenant-dev-ravi snapshot-sample-qzan-f5dhn&#xA;PipelineRun tenant-n2wzk reason: Running&#xA;PipelineRun tenant-n2wzk reason: Succeeded&#xA;&lt; Exit [It] verifies that Tenant PipelineRun is triggered - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:117 @ 05/18/26 22:54:28.78 (40.067s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:54:28.78&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:54:28.78 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service tenant pipeline] Post-release verification verifies that a Release is marked as succeeded. [release-service, tenant]" classname="Red Hat App Studio E2E tests" status="passed" time="54.422323846">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:121 @ 05/18/26 22:54:28.781&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:121 @ 05/18/26 22:54:28.863 (83ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:54:28.863&#xA;&lt; Exit [AfterEach] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:28 @ 05/18/26 22:54:28.863 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:102 @ 05/18/26 22:54:28.863&#xA;&lt; Exit [AfterAll] [release-service-suite Release service tenant pipeline] - /tmp/tmp.5k64aXXzs4/tests/release/service/tenant_pipelines.go:102 @ 05/18/26 22:55:23.203 (54.339s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] Verify AppStudioProvisionedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="panicked" time="29.658050798">
              <error message="runtime error: invalid memory address or nil pointer dereference" type="panicked">[PANICKED] Test Panicked&#xA;In [It] at: /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 @ 05/18/26 22:53:49.221&#xA;&#xA;runtime error: invalid memory address or nil pointer dereference&#xA;&#xA;Full Stack Trace&#xA;  k8s.io/apimachinery/pkg/util/runtime.handleCrash({0x4382688, 0xc000717b90}, {0x346f660, 0x6583480}, {0x0, 0x0, 0x4470a0?})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 +0x1a9&#xA;  k8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x4382688, 0xc000717b90}, {0x0, 0x0, 0x0})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a&#xA;  panic({0x346f660?, 0x6583480?})&#xA;  &#x9;/usr/lib/golang/src/runtime/panic.go:783 +0x132&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:319 +0x35&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000717c01?, 0xc000141c18?})&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x13&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x4382688?, 0xc000717b90?}, 0x4382688?)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x4382688, 0xc000717b90}, {0x436d2c0, 0xc001ecc420}, 0x1, 0x0, 0xc001ef5d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115&#xA;  k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x4382538?, 0x6635e80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc000141d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc000141dd8?, 0x1?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x45&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x3b90a1c?, {0x3b90a1c?, 0x3b8d23d?}, 0x8?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:318 +0x72&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x3b90a1c, 0x9})&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:314 +0x4b&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/tests/upgrade/verify/verifyUsers.go:14 +0x25&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:21 +0x1a&#xA;</error>
              <system-err>&gt; Enter [BeforeAll] [upgrade-suite Create users and check their state] - /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:16 @ 05/18/26 22:53:19.564&#xA;&lt; Exit [BeforeAll] [upgrade-suite Create users and check their state] - /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:16 @ 05/18/26 22:53:49.221 (29.657s)&#xA;&gt; Enter [It] Verify AppStudioProvisionedUser - /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:20 @ 05/18/26 22:53:49.221&#xA;&#34;msg&#34;=&#34;Observed a panic&#34; &#34;error&#34;=null &#34;panic&#34;=&#34;runtime error: invalid memory address or nil pointer dereference&#34; &#34;panicGoValue&#34;=&#34;\&#34;invalid memory address or nil pointer dereference\&#34;&#34; &#34;stacktrace&#34;=&#34;goroutine 159 [running]:\nk8s.io/apimachinery/pkg/util/runtime.logPanic({0x43825e0, 0xc001ec3860}, {0x346f660, 0x6583480})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:132 +0xbc\nk8s.io/apimachinery/pkg/util/runtime.handleCrash({0x4382688, 0xc000717b90}, {0x346f660, 0x6583480}, {0x0, 0x0, 0x4470a0?})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:107 +0x116\nk8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x4382688, 0xc000717b90}, {0x0, 0x0, 0x0})\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a\npanic({0x346f660?, 0x6583480?})\n\t/usr/lib/golang/src/runtime/panic.go:783 +0x132\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()\n\t/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:319 +0x35\ngithub.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000717c01?, 0xc000141c18?})\n\t/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x13\nk8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x4382688?, 0xc000717b90?}, 0x4382688?)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62\nk8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x4382688, 0xc000717b90}, {0x436d2c0, 0xc001ecc420}, 0x1, 0x0, 0xc000141d90)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115\nk8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x4382538?, 0x6635e80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc000141d90)\n\t/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5\ngithub.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc000141dd8?, 0x1?)\n\t/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x45\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x3b90a1c?, {0x3b90a1c?, 0x3b8d23d?}, 0x8?)\n\t/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:318 +0x72\ngithub.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x3b90a1c, 0x9})\n\t/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:314 +0x4b\ngithub.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)\n\t/tmp/tmp.5k64aXXzs4/tests/upgrade/verify/verifyUsers.go:14 +0x25\ngithub.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()\n\t/tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:21 +0x1a\ngithub.com/onsi/ginkgo/v2/internal.extractBodyFunction.func3({0x0?, 0x0?})\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/node.go:585 +0x13\ngithub.com/onsi/ginkgo/v2/internal.(*Suite).runNode.func3()\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:946 +0x393\ncreated by github.com/onsi/ginkgo/v2/internal.(*Suite).runNode in goroutine 107\n\t/opt/app-root/src/go/pkg/mod/github.com/onsi/ginkgo/v2@v2.28.0/internal/suite.go:911 +0xd90\n&#34;&#xA;[PANICKED] Test Panicked&#xA;In [It] at: /opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 @ 05/18/26 22:53:49.221&#xA;&#xA;runtime error: invalid memory address or nil pointer dereference&#xA;&#xA;Full Stack Trace&#xA;  k8s.io/apimachinery/pkg/util/runtime.handleCrash({0x4382688, 0xc000717b90}, {0x346f660, 0x6583480}, {0x0, 0x0, 0x4470a0?})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:114 +0x1a9&#xA;  k8s.io/apimachinery/pkg/util/runtime.HandleCrashWithContext({0x4382688, 0xc000717b90}, {0x0, 0x0, 0x0})&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/runtime/runtime.go:78 +0x5a&#xA;  panic({0x346f660?, 0x6583480?})&#xA;  &#x9;/usr/lib/golang/src/runtime/panic.go:783 +0x132&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp.func1()&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:319 +0x35&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval.func1({0xc000717c01?, 0xc000141c18?})&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x13&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext.func1({0x4382688?, 0xc000717b90?}, 0x4382688?)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:53 +0x62&#xA;  k8s.io/apimachinery/pkg/util/wait.loopConditionUntilContext({0x4382688, 0xc000717b90}, {0x436d2c0, 0xc001ecc420}, 0x1, 0x0, 0xc001ef5d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/loop.go:54 +0x115&#xA;  k8s.io/apimachinery/pkg/util/wait.PollUntilContextTimeout({0x4382538?, 0x6635e80?}, 0xee6b2800, 0x41d765?, 0x1, 0xc000141d90)&#xA;  &#x9;/opt/app-root/src/go/pkg/mod/k8s.io/apimachinery@v0.34.2/pkg/util/wait/poll.go:48 +0xa5&#xA;  github.com/konflux-ci/e2e-tests/pkg/utils.WaitUntilWithInterval(0xa?, 0xc000141dd8?, 0x1?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/utils/util.go:129 +0x45&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreatedWithSignUp(0x3b90a1c?, {0x3b90a1c?, 0x3b8d23d?}, 0x8?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:318 +0x72&#xA;  github.com/konflux-ci/e2e-tests/pkg/sandbox.(*SandboxController).CheckUserCreated(0x0, {0x3b90a1c, 0x9})&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/pkg/sandbox/sandbox.go:314 +0x4b&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade/verify.VerifyAppStudioProvisionedUser(0x0?)&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/tests/upgrade/verify/verifyUsers.go:14 +0x25&#xA;  github.com/konflux-ci/e2e-tests/tests/upgrade.init.func1.2()&#xA;  &#x9;/tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:21 +0x1a&#xA;&lt; Exit [It] Verify AppStudioProvisionedUser - /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:20 @ 05/18/26 22:53:49.221 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioDeactivatedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:24 @ 05/18/26 22:53:49.222&#xA;</system-err>
          </testcase>
          <testcase name="[It] [upgrade-suite Create users and check their state] creates AppStudioBannedUser [upgrade-verify]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/upgrade/verifyWorkload.go:28 @ 05/18/26 22:53:49.222&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="53.89975807">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:34 @ 05/18/26 22:53:49.223&#xA;&lt; Exit [BeforeAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:34 @ 05/18/26 22:54:42.991 (53.768s)&#xA;&gt; Enter [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:66 @ 05/18/26 22:54:42.991&#xA;&lt; Exit [It] missing ReleasePlan makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:66 @ 05/18/26 22:54:43.122 (131ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/18/26 22:54:43.122&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/18/26 22:54:43.122 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] post-release verification. missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. [release-service, release-neg, negMissingReleasePlan]" classname="Red Hat App Studio E2E tests" status="passed" time="55.14892247">
              <system-err>&gt; Enter [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:76 @ 05/18/26 22:54:43.123&#xA;&lt; Exit [It] missing ReleasePlanAdmission makes a Release CR set as failed in both IsReleased and IsValid with a proper message to user. - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:76 @ 05/18/26 22:54:43.161 (38ms)&#xA;&gt; Enter [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/18/26 22:54:43.161&#xA;&lt; Exit [AfterEach] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:32 @ 05/18/26 22:54:43.161 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:58 @ 05/18/26 22:54:43.161&#xA;&lt; Exit [AfterAll] [release-service-suite [HACBS-2360] Release CR fails when missing ReleasePlan and ReleasePlanAdmission.] - /tmp/tmp.5k64aXXzs4/tests/release/service/missing_release_plan_and_admission.go:58 @ 05/18/26 22:55:38.272 (55.11s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates first component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="31.433338038">
              <system-err>&gt; Enter [BeforeAll] test build secret lookup - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:32 @ 05/18/26 22:53:19.556&#xA;&lt; Exit [BeforeAll] test build secret lookup - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:32 @ 05/18/26 22:53:40.814 (21.258s)&#xA;&gt; Enter [BeforeAll] when two secrets are created - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:100 @ 05/18/26 22:53:40.814&#xA;&lt; Exit [BeforeAll] when two secrets are created - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:100 @ 05/18/26 22:53:40.833 (19ms)&#xA;&gt; Enter [It] creates first component - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:123 @ 05/18/26 22:53:40.833&#xA;&lt; Exit [It] creates first component - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:123 @ 05/18/26 22:53:50.895 (10.062s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:53:50.896&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:53:50.896 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created creates second component [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="10.039686061">
              <system-err>&gt; Enter [It] creates second component - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:140 @ 05/18/26 22:53:50.896&#xA;&lt; Exit [It] creates second component - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:140 @ 05/18/26 22:54:00.935 (10.039s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:54:00.936&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:54:00.936 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check first component annotation has errors [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007598381">
              <system-err>&gt; Enter [It] check first component annotation has errors - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:158 @ 05/18/26 22:54:00.936&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;error&#34;,&#34;error-id&#34;:74,&#34;error-message&#34;:&#34;74: Access token is unrecognizable by GitHub&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;&lt; Exit [It] check first component annotation has errors - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:158 @ 05/18/26 22:54:00.943 (7ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:54:00.944&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:54:00.944 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created triggered PipelineRun is for component  [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="60.070012363">
              <system-err>&gt; Enter [It] triggered PipelineRun is for component  - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:178 @ 05/18/26 22:54:00.944&#xA;PipelineRun has not been created yet for the component build-e2e-sqra/component-two-uxiq&#xA;PipelineRun has not been created yet for the component build-e2e-sqra/component-two-uxiq&#xA;PipelineRun has not been created yet for the component build-e2e-sqra/component-two-uxiq&#xA;&lt; Exit [It] triggered PipelineRun is for component  - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:178 @ 05/18/26 22:55:01.014 (1m0.07s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:55:01.014&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:55:01.014 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created check only one pipelinerun should be triggered [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="passed" time="123.397775705">
              <system-err>&gt; Enter [It] check only one pipelinerun should be triggered - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:193 @ 05/18/26 22:55:01.015&#xA;&lt; Exit [It] check only one pipelinerun should be triggered - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:193 @ 05/18/26 22:57:01.016 (2m0.001s)&#xA;&gt; Enter [AfterAll] test build secret lookup - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:61 @ 05/18/26 22:57:01.016&#xA;&lt; Exit [AfterAll] test build secret lookup - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:61 @ 05/18/26 22:57:04.412 (3.396s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:57:04.412&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/secret_lookup.go:25 @ 05/18/26 22:57:04.412 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test build secret lookup when two secrets are created when second component is deleted, pac pr branch should not exist in the repo [build-service, github, pac-build, secret-lookup]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release CR should have been created in the dev namespace [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="79.378005888">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:42 @ 05/18/26 22:53:19.561&#xA;snapshotPush.Name: %s snapshot-sample-fnfm&#xA;&lt; Exit [BeforeAll] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:42 @ 05/18/26 22:54:38.674 (1m19.114s)&#xA;&gt; Enter [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:151 @ 05/18/26 22:54:38.674&#xA;&lt; Exit [It] verifies that a Release CR should have been created in the dev namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:151 @ 05/18/26 22:54:38.938 (263ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:54:38.938&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:54:38.938 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Release PipelineRun is triggered [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="80.018111831">
              <system-err>&gt; Enter [It] verifies that Release PipelineRun is triggered - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:158 @ 05/18/26 22:54:38.939&#xA;PipelineRun has not been created yet for release %s/%s happy-path-impw snapshot-sample-fnfm-648vh&#xA;PipelineRun managed-9q5zb reason: Running&#xA;PipelineRun managed-9q5zb reason: Running&#xA;PipelineRun managed-9q5zb reason: Running&#xA;PipelineRun managed-9q5zb reason: Succeeded&#xA;&lt; Exit [It] verifies that Release PipelineRun is triggered - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:158 @ 05/18/26 22:55:58.957 (1m20.018s)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:58.957&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:58.957 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that Enterprise Contract Task has succeeded in the Release PipelineRun [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="0.040826152">
              <system-err>&gt; Enter [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:162 @ 05/18/26 22:55:58.957&#xA;the status of the verify-conforma TaskRun on the release pipeline is: [{Succeeded True  {2026-05-18 22:55:51 +0000 UTC} Succeeded All Steps have completed executing}]&#xA;&lt; Exit [It] verifies that Enterprise Contract Task has succeeded in the Release PipelineRun - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:162 @ 05/18/26 22:55:58.998 (41ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:58.998&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:58.998 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite Release service happy path] Post-release verification verifies that a Release is marked as succeeded. [release-service, happy-path]" classname="Red Hat App Studio E2E tests" status="passed" time="92.085716872">
              <system-err>&gt; Enter [It] verifies that a Release is marked as succeeded. - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:174 @ 05/18/26 22:55:58.998&#xA;&lt; Exit [It] verifies that a Release is marked as succeeded. - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:174 @ 05/18/26 22:55:59.009 (11ms)&#xA;&gt; Enter [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:59.009&#xA;&lt; Exit [AfterEach] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:27 @ 05/18/26 22:55:59.009 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:142 @ 05/18/26 22:55:59.01&#xA;&lt; Exit [AfterAll] [release-service-suite Release service happy path] - /tmp/tmp.5k64aXXzs4/tests/release/service/happy_path.go:142 @ 05/18/26 22:57:31.084 (1m32.074s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an application [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="73.305421268">
              <system-err>&gt; Enter [BeforeAll] Maven project - Default build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:84 @ 05/18/26 22:53:19.459&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: initializing framework for appappMaven project - Default build&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: namespacesuserNamespacekonflux-lxifmanagedNamespacekonflux-lxif-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: component configcomponentNamekonflux-demo-component-pxwjpacBranchNamekonflux-konflux-demo-component-pxwjcomponentRepositoryNamehacbs-test-project-konflux-demo&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: creating release configmanagedNamespacekonflux-lxif-manageduserNamespacekonflux-lxif&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating managed namespacemanagedNamespacekonflux-lxif-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: creating release-service-accountmanagedNamespacekonflux-lxif-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo createReleaseConfig: finishedmanagedNamespacekonflux-lxif-manageduserNamespacekonflux-lxif&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: created and linked release-catalog-trusted-artifacts-quay-secretmanagedNamespacekonflux-lxif-managed&#34;&#xA;created and linked release-catalog-trusted-artifacts-quay-secret in namespace &#34;konflux-lxif-managed&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo BeforeAll: setup completeappMaven project - Default buildcomponentNamekonflux-demo-component-pxwj&#34;&#xA;&lt; Exit [BeforeAll] Maven project - Default build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:84 @ 05/18/26 22:54:32.733 (1m13.274s)&#xA;&gt; Enter [It] creates an application - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:189 @ 05/18/26 22:54:32.733&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating applicationapplicationNamekonflux-demo-appnamespacekonflux-lxif&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: application createdapplicationNamekonflux-demo-app&#34;&#xA;&lt; Exit [It] creates an application - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:189 @ 05/18/26 22:54:32.764 (31ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates an IntegrationTestScenario for the app [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="5.054141326">
              <system-err>&gt; Enter [It] creates an IntegrationTestScenario for the app - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:202 @ 05/18/26 22:54:32.764&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating IntegrationTestScenarioapplicationNamekonflux-demo-appnamespacekonflux-lxif&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo: CreateIntegrationTestScenario failed (will retry): admission webhook \&#34;dintegrationtestscenario.kb.io\&#34; denied the request: could not find application &#39;konflux-demo-app&#39; in namespace &#39;konflux-lxif&#39;&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: IntegrationTestScenario createdscenariomy-integration-test-wrfu&#34;&#xA;&lt; Exit [It] creates an IntegrationTestScenario for the app - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:202 @ 05/18/26 22:54:37.818 (5.054s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates new branch for the build [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="0.678315496">
              <system-err>&gt; Enter [It] creates new branch for the build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:218 @ 05/18/26 22:54:37.819&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating branch for buildrepohacbs-test-project-konflux-demobranchbase-tjuxusfrommain&#34;&#xA;&lt; Exit [It] creates new branch for the build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:218 @ 05/18/26 22:54:38.497 (678ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="passed" time="10.042191927">
              <system-err>&gt; Enter [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:233 @ 05/18/26 22:54:38.498&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: creating componentcomponentNamekonflux-demo-component-pxwjapplicationNamekonflux-demo-appnamespacekonflux-lxifrevisionbase-tjuxus&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: component createdcomponentNamekonflux-demo-component-pxwj&#34;&#xA;&lt; Exit [It] creates component konflux-demo-component (private: false) from git source https://github.com/redhat-appstudio-qe/hacbs-test-project-konflux-demo - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:233 @ 05/18/26 22:54:48.54 (10.042s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created triggers creation of a PR in the sample repo [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="failed" time="340.640148429">
              <failure message="Timed out after 300.000s.&#xA;timed out when waiting for `pull-request` event type PaC PipelineRun to be present in the user namespace &#34;konflux-lxif&#34; for component &#34;konflux-demo-component-pxwj&#34; with a label pointing to &#34;konflux-demo-app&#34;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001e88590&gt;: &#xA;    no pipelinerun found for component konflux-demo-component-pxwj&#xA;    {&#xA;        s: &#34;no pipelinerun found for component konflux-demo-component-pxwj&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 300.000s.&#xA;timed out when waiting for `pull-request` event type PaC PipelineRun to be present in the user namespace &#34;konflux-lxif&#34; for component &#34;konflux-demo-component-pxwj&#34; with a label pointing to &#34;konflux-demo-app&#34;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001e88590&gt;: &#xA;    no pipelinerun found for component konflux-demo-component-pxwj&#xA;    {&#xA;        s: &#34;no pipelinerun found for component konflux-demo-component-pxwj&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:294 @ 05/18/26 23:00:29.18&#xA;</failure>
              <system-err>&gt; Enter [It] triggers creation of a PR in the sample repo - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:259 @ 05/18/26 22:54:48.54&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for PaC PRrepohacbs-test-project-konflux-demopacBranchNamekonflux-konflux-demo-component-pxwj&#34;&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;msg&#34;=&#34;Konflux demo: could not get the expected PaC branch name konflux-konflux-demo-component-pxwj (found 12 PRs)&#34; &#34;error&#34;=null&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: PaC PR createdprNumber30046prSHA7d9b068d40c94a1b5dc80cc6e08002658910c961&#34;&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;Konflux demo: waiting for pull-request PipelineRun to appear (will delete it)componentkonflux-demo-component-pxwjprSHA7d9b068d40c94a1b5dc80cc6e08002658910c961&#34;&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;PipelineRun not found yet for component konflux-lxif/konflux-demo-component-pxwj prSHA 7d9b068d40c94a1b5dc80cc6e08002658910c961: no pipelinerun found for component konflux-demo-component-pxwj&#xA;[FAILED] Timed out after 300.000s.&#xA;timed out when waiting for `pull-request` event type PaC PipelineRun to be present in the user namespace &#34;konflux-lxif&#34; for component &#34;konflux-demo-component-pxwj&#34; with a label pointing to &#34;konflux-demo-app&#34;&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001e88590&gt;: &#xA;    no pipelinerun found for component konflux-demo-component-pxwj&#xA;    {&#xA;        s: &#34;no pipelinerun found for component konflux-demo-component-pxwj&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:294 @ 05/18/26 23:00:29.18&#xA;&lt; Exit [It] triggers creation of a PR in the sample repo - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:259 @ 05/18/26 23:00:29.18 (5m40.64s)&#xA;&gt; Enter [AfterAll] Maven project - Default build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:154 @ 05/18/26 23:00:29.18&#xA;&lt; Exit [AfterAll] Maven project - Default build - /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:154 @ 05/18/26 23:00:29.18 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created verifies component build status [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:297 @ 05/18/26 23:00:29.181&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Component is created should eventually lead to triggering a &#39;push&#39; event type PipelineRun after merging the PaC init branch  [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:335 @ 05/18/26 23:00:29.181&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created does not contain an annotation with a Snapshot Name [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:369 @ 05/18/26 23:00:29.181&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:373 @ 05/18/26 23:00:29.182&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate Tekton TaskRun test results successfully [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:389 @ 05/18/26 23:00:29.182&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is signed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:403 @ 05/18/26 23:00:29.182&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Snapshot CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:419 @ 05/18/26 23:00:29.182&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should validate that the build pipelineRun is annotated with the name of the Snapshot [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:432 @ 05/18/26 23:00:29.182&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Build PipelineRun completes successfully should find the related Integration Test PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:441 @ 05/18/26 23:00:29.183&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when push pipelinerun is retriggered should eventually succeed [konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:462 @ 05/18/26 23:00:29.183&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun is created should eventually complete successfully [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:493 @ 05/18/26 23:00:29.183&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should lead to Snapshot CR being marked as passed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:505 @ 05/18/26 23:00:29.183&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Integration Test PipelineRun completes successfully should trigger creation of Release CR [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:518 @ 05/18/26 23:00:29.183&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release CR is created triggers creation of Release PipelineRun [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:533 @ 05/18/26 23:00:29.184&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is triggered should eventually succeed [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:552 @ 05/18/26 23:00:29.184&#xA;</system-err>
          </testcase>
          <testcase name="[It] [konflux-demo-suite] Maven project - Default build when Release PipelineRun is completed should lead to Release CR being marked as succeeded [konflux, upstream-konflux]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/konflux-demo/konflux-demo.go:578 @ 05/18/26 23:00:29.184&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies if the chains controller is running [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="21.791028579">
              <system-err>&gt; Enter [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:31 @ 05/18/26 22:53:19.561&#xA;&lt; Exit [BeforeAll] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:31 @ 05/18/26 22:53:41.244 (21.683s)&#xA;&gt; Enter [It] verifies if the chains controller is running - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:43 @ 05/18/26 22:53:41.244&#xA;&lt; Exit [It] verifies if the chains controller is running - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:43 @ 05/18/26 22:53:41.35 (106ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:53:41.35&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:53:41.35 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] infrastructure is running verifies the signing secret is present [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="0.01405344">
              <system-err>&gt; Enter [It] verifies the signing secret is present - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:48 @ 05/18/26 22:53:41.351&#xA;&lt; Exit [It] verifies the signing secret is present - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:48 @ 05/18/26 22:53:41.365 (14ms)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:53:41.365&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:53:41.365 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task creates signature and attestation [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="286.550044735">
              <system-err>&gt; Enter [BeforeAll] test creating and signing an image and task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:73 @ 05/18/26 22:53:41.366&#xA;Creating Pipeline &#34;buildah-demo-xbyltndmbb&#34;&#xA;Waiting for pipeline &#34;buildah-demo-xbyltndmbb&#34; to finish&#xA;The pipeline named &#34;buildah-demo-xbyltndmbb&#34; in namespace &#34;chains-e2e-wsuk&#34; succeeded&#xA;The image signed by Tekton Chains is quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&lt; Exit [BeforeAll] test creating and signing an image and task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:73 @ 05/18/26 22:58:25.714 (4m44.348s)&#xA;&gt; Enter [It] creates signature and attestation - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:115 @ 05/18/26 22:58:25.714&#xA;failed to get cosign result for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7: failed to find cosign results for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7: error when getting attestation tag: cannot get manifest digest from quay.io/redhat-appstudio-qe/test-images:sha256-cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7.att image. response body: {&#34;tags&#34;: [], &#34;page&#34;: 1, &#34;has_additional&#34;: false}&#xA;&#xA;&#xA;failed to get cosign result for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7: failed to find cosign results for image quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7: error when getting attestation tag: cannot get manifest digest from quay.io/redhat-appstudio-qe/test-images:sha256-cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7.att image. response body: {&#34;tags&#34;: [], &#34;page&#34;: 1, &#34;has_additional&#34;: false}&#xA;&#xA;&#xA;Cosign verify pass with .att and .sig ImageStreamTags found for quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&lt; Exit [It] creates signature and attestation - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:115 @ 05/18/26 22:58:27.915 (2.201s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:58:27.916&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:58:27.916 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task succeeds when policy is met [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="23.303834274">
              <system-err>&gt; Enter [BeforeAll] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:133 @ 05/18/26 22:58:27.916&#xA;Copy public key from openshift-pipelines/signing-secrets to a new secret&#xA;Configured Rekor host: https://rekor.sigstore.dev&#xA;Using verify EC task bundle: quay.io/conforma/tekton-task:kf-b345847182602d9a5ce9e957fa76fe02575c8018@sha256:7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;&lt; Exit [BeforeAll] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:133 @ 05/18/26 22:58:27.952 (36ms)&#xA;&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:58:27.952&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:58:27.968 (16ms)&#xA;&gt; Enter [It] succeeds when policy is met - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:177 @ 05/18/26 22:58:27.968&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-688rh&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-688rh&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-18T22:58:50Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-18T22:58:50Z&#34;&#xA;  message: All Steps have completed executing&#xA;  reason: Succeeded&#xA;  status: &#34;True&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1779145129&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;}&#xA;spanContext:&#xA;  traceparent: 00-4b59f427a9320fc116c9cdb24c0ac65d-cfc9078ba0698df2-01&#xA;startTime: &#34;2026-05-18T22:58:28Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d0ef3ac0a517847509964d8a77dd0b567dbef01e34f9f978cc388b1cdfb9dbb8&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:43Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:43Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a131ee39db5d61447c97b9379ce94cf3ea54adc8d4b68ee2d98933888500a8f3&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:43Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:43Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://0c73225843abf0810baccf7d8c700d9e6e818e939b9394c7ddd4dbd1e2ec86b0&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:43Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://fb0d5c8e9d17810b7685ea9b6b0ebfea831c20005c79827260430fa128481808&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://1b4d2ad2a2a25071d0738c939a440f1d39db70dd70ee9ce974cf09e95c706e5a&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://09ea8ece51968a0c7a68ebcbe423b3976b14c9b62904ccdc320deae48222b4e1&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://e833d245f8f4f388615582284985ce38b9d43153884ca2503fb2e482e150cb0f&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://2b7b08a0a75b86b5f1425edfedaaf03391adea50a6c4131dad7be0d0c8882daf&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:49Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://30cf11621bd775c81d4e2206ecb430b78dd3b00b044e49dda20fc26ff68bc3de&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:50Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145129\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:50Z&#34;&#xA;  terminationReason: Completed&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;application&#34;:&#34;&#34;,&#34;componentGroup&#34;:&#34;&#34;,&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;version&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-wsuk/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/18 22:58:43 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;application&#34;: &#34;&#34;,&#xA;  &#34;componentGroup&#34;: &#34;&#34;,&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;version&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: true,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDO7VmzKhKn+KusuUhf3sM83QutYGjjIdUF2lImMuo8hgIhAOLy3z4eXI9uV8DHFJOW7hjDDIAFcu7O80isO+Dkx6p2&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQC6ie+2uEmImRyEEli2F/DzTFAquZUSgS38isZDMZjfzwIgGFKyG3TwcJ1huFlxAyP37F/3HZjRvsRNxqizgwQVuXI=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDUxzmaFEFFS0vTNYk9ZO6RwtnU9PTnLsnmxYd0zsQzrwIhAP+HxrbNQxrQxoWwQboyCVT0EOB0S0wfkkVBvLxEQFiv&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:SKexBoyOeCGwLPMsBeGx/v/h1hPigyD2C5K5qSC0MRE&#34;,&#34;sig&#34;: &#34;MEUCIQCDY64vAG02LdcmhlhGeqPPZGhbmbLbryWSM83dYxxGWQIgGQINRNe4sW8Y91NLtORyMGfwfhtHiq/wvIqPOF8g2zM=&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T22:58:43.821069109Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1779145129&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 0,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;SUCCESS&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (3 weeks ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;slsa_provenance_available&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-18T22:58:43.821069109Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: true&#xA;Result: SUCCESS&#xA;Violations: 0, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-9a43a13b63901dd096bea924d7f03c60-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----true&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-688rh succeeded&#xA;Make sure result for TaskRun &#34;verify-enterprise-contract&#34; succeeded&#xA;&lt; Exit [It] succeeds when policy is met - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:177 @ 05/18/26 22:58:51.22 (23.252s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:58:51.22&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:58:51.22 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task does not pass when tests are not satisfied on non-strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="13.277088503">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:58:51.221&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:58:51.238 (17ms)&#xA;&gt; Enter [It] does not pass when tests are not satisfied on non-strict mode - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:197 @ 05/18/26 22:58:51.238&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-4xjps&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-4xjps&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-18T22:59:03Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-18T22:59:03Z&#34;&#xA;  message: All Steps have completed executing&#xA;  reason: Succeeded&#xA;  status: &#34;True&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1779145142&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:1,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-e56bb5767c01ac3e06d17790da05d7e3-7e1349203bab3ea1-01&#xA;startTime: &#34;2026-05-18T22:58:51Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://f853bab9148a196eb34022d6d14bb6eda782d73116edf4c154c58b9a5e842b21&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:56Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:56Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://fa5d27470ad1ddc89d1699d7cfca4ae0f4eb8977d8014992f4727e0fba83a0c4&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:58:56Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:56Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://7b2e624d3271abdadabda732b29e1d53ce360a77e61e2efb3c4eb7e5f0334fd9&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:58:56Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d07d93a3ac0204aad2b54e0e7d6d0f876912557d00dd4b479933622c351be60a&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://20b4e55048b0d279b900c6c298054b8edc378a4163b178ecc74b22caf57382de&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://b5f55db22c9ca419312472bf2e9022dd176f65b9db7be74c2c6500cbb44a6cb8&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d18dbe45b48eb17b6169b8895dc3393e63e8052022d8c369d01c0651b323efad&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://c06a180dbe3f09bb36059d5c13312f3cc8bc8b8d5c83360163b0770cc304b03e&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://b997359192d3f7ed34a6fa0c670749a61c6bf35367bb2ef2c2010725c98f06f6&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145142\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:02Z&#34;&#xA;  terminationReason: Completed&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;application&#34;:&#34;&#34;,&#34;componentGroup&#34;:&#34;&#34;,&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;version&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-wsuk/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;false&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/18 22:58:56 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;application&#34;: &#34;&#34;,&#xA;  &#34;componentGroup&#34;: &#34;&#34;,&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;version&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No test data found&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_data_found&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma expects to find test result data. To exclude this rule add \&#34;test.test_data_found\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#34;,&#34;title&#34;: &#34;Test data found in task results&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.rule_data_provided&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_tests_results`, `failed_tests_results`, `informative_tests`, `erred_tests_results`, `skipped_tests_results`, and `warned_tests_results`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_all_images&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Ensure that task producing the IMAGES_PROCESSED result contains the digests of the built image.&#34;,&#34;effective_on&#34;: &#34;2024-05-29T00:00:00Z&#34;,&#34;title&#34;: &#34;Image digest is present in IMAGES_PROCESSED result&#34;}}],&#34;success&#34;: false,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDO7VmzKhKn+KusuUhf3sM83QutYGjjIdUF2lImMuo8hgIhAOLy3z4eXI9uV8DHFJOW7hjDDIAFcu7O80isO+Dkx6p2&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQC6ie+2uEmImRyEEli2F/DzTFAquZUSgS38isZDMZjfzwIgGFKyG3TwcJ1huFlxAyP37F/3HZjRvsRNxqizgwQVuXI=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDUxzmaFEFFS0vTNYk9ZO6RwtnU9PTnLsnmxYd0zsQzrwIhAP+HxrbNQxrQxoWwQboyCVT0EOB0S0wfkkVBvLxEQFiv&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:SKexBoyOeCGwLPMsBeGx/v/h1hPigyD2C5K5qSC0MRE&#34;,&#34;sig&#34;: &#34;MEUCIQCDY64vAG02LdcmhlhGeqPPZGhbmbLbryWSM83dYxxGWQIgGQINRNe4sW8Y91NLtORyMGfwfhtHiq/wvIqPOF8g2zM=&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;test&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T22:58:56.703622576Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1779145142&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 1,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (3 weeks ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;test&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-18T22:58:56.703622576Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 1, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&#xA;Results:&#xA;✕ [Violation] test.test_data_found&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;  Reason: No test data found&#xA;  Title: Test data found in task results&#xA;  Description: Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma&#xA;  expects to find test result data. To exclude this rule add &#34;test.test_data_found&#34; to the `exclude` section of the policy&#xA;  configuration.&#xA;  Solution: Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-4fcd7f4ed2e1917fe3afe8799e61a188-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----true&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-4xjps succeeded&#xA;Make sure result for TaskRun &#34;verify-enterprise-contract&#34; succeeded&#xA;&lt; Exit [It] does not pass when tests are not satisfied on non-strict mode - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:197 @ 05/18/26 22:59:04.497 (13.259s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:04.498&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:04.498 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when tests are not satisfied on strict mode [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="13.238626521">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:04.498&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:04.519 (21ms)&#xA;&gt; Enter [It] fails when tests are not satisfied on strict mode - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:225 @ 05/18/26 22:59:04.519&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-cqmfh&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-cqmfh&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-18T22:59:17Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-18T22:59:17Z&#34;&#xA;  message: &#39;&#34;step-assert&#34; exited with code 1: Error&#39;&#xA;  reason: StepFailed&#xA;  status: &#34;False&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1779145155&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:5,&#34;failures&#34;:1,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-b7529c77741149992b1d16c46e65b60e-501f939ef5499f4f-01&#xA;startTime: &#34;2026-05-18T22:59:05Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://08c4f705af9085be6f59827658fc5f30b1a5f8088de6bcfdb904fc0a86bcbb34&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:10Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:10Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d8a0c5fd71b16ff262a5b1386255e48d15d7f90729a2adef0d2f6abbcc411330&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:10Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:10Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://d100fd78cb4f8970b0436786ff2298de47467264b77229c7c5c5492fa6075079&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:15Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:10Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://6dd281f9b0f249c65c77d9a6be2bcf70249949af067dede65a931c508e2b7533&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://55e6f2a641c631f5adaf2e724bdb65966d2c82ceceec77dd5b6a456b851298fe&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://eaed786651df7b35b66486dab8a3297f47668315395f9919823de94d244eef0c&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://77a7fcd53946ba10b3ee1a0100276ab2d8eff6f8f465a8eed908d4e8de50abea&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://e4f2920f3ab362bc0eb3bd9af5c1875042eb9d4529c9c51e1ecc3e6a687b341e&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:16Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://becaad894de11268c8423dc2aff6ae069f5a22590f26ec1cb8247edd69fdf576&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-05-18T22:59:17Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145155\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:5,\&#34;failures\&#34;:1,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-05-18T22:59:17Z&#34;&#xA;  terminationReason: Error&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;application&#34;:&#34;&#34;,&#34;componentGroup&#34;:&#34;&#34;,&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;version&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-wsuk/cosign-public-key&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/18 22:59:10 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;application&#34;: &#34;&#34;,&#xA;  &#34;componentGroup&#34;: &#34;&#34;,&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;version&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No test data found&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_data_found&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma expects to find test result data. To exclude this rule add \&#34;test.test_data_found\&#34; to the `exclude` section of the policy configuration.&#34;,&#34;solution&#34;: &#34;Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#34;,&#34;title&#34;: &#34;Test data found in task results&#34;}}],&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.rule_data_provided&#34;,&#34;collections&#34;: [&#34;redhat&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_tests_results`, `failed_tests_results`, `informative_tests`, `erred_tests_results`, `skipped_tests_results`, and `warned_tests_results`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;test.test_all_images&#34;,&#34;collections&#34;: [&#34;redhat&#34;],&#34;description&#34;: &#34;Ensure that task producing the IMAGES_PROCESSED result contains the digests of the built image.&#34;,&#34;effective_on&#34;: &#34;2024-05-29T00:00:00Z&#34;,&#34;title&#34;: &#34;Image digest is present in IMAGES_PROCESSED result&#34;}}],&#34;success&#34;: false,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDO7VmzKhKn+KusuUhf3sM83QutYGjjIdUF2lImMuo8hgIhAOLy3z4eXI9uV8DHFJOW7hjDDIAFcu7O80isO+Dkx6p2&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQC6ie+2uEmImRyEEli2F/DzTFAquZUSgS38isZDMZjfzwIgGFKyG3TwcJ1huFlxAyP37F/3HZjRvsRNxqizgwQVuXI=&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQDUxzmaFEFFS0vTNYk9ZO6RwtnU9PTnLsnmxYd0zsQzrwIhAP+HxrbNQxrQxoWwQboyCVT0EOB0S0wfkkVBvLxEQFiv&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:SKexBoyOeCGwLPMsBeGx/v/h1hPigyD2C5K5qSC0MRE&#34;,&#34;sig&#34;: &#34;MEUCIQCDY64vAG02LdcmhlhGeqPPZGhbmbLbryWSM83dYxxGWQIgGQINRNe4sW8Y91NLtORyMGfwfhtHiq/wvIqPOF8g2zM=&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;test&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T22:59:10.834303644Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1779145155&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 5,&#xA;  &#34;failures&#34;: 1,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (3 weeks ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;test&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-18T22:59:10.834303644Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 1, Warnings: 0, Successes: 5&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&#xA;Results:&#xA;✕ [Violation] test.test_data_found&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;  Reason: No test data found&#xA;  Title: Test data found in task results&#xA;  Description: Ensure that at least one of the tasks in the pipeline includes a TEST_OUTPUT task result, which is where Conforma&#xA;  expects to find test result data. To exclude this rule add &#34;test.test_data_found&#34; to the `exclude` section of the policy&#xA;  configuration.&#xA;  Solution: Confirm at least one task in the build pipeline contains a result named TEST_OUTPUT.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-3b671ca7c991aa3e9ea32835c8a7e69b-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----false&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-cqmfh failed&#xA;&lt; Exit [It] fails when tests are not satisfied on strict mode - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:225 @ 05/18/26 22:59:17.737 (13.217s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:17.737&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:17.737 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task fails when unexpected signature is used [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="20.248466336">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:17.738&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:17.757 (20ms)&#xA;&gt; Enter [It] fails when unexpected signature is used - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:251 @ 05/18/26 22:59:17.758&#xA;Create an unexpected public signing key&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-xp6tp&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-xp6tp&#34; to finish&#xA;*** TaskRun status:&#xA;artifacts: {}&#xA;completionTime: &#34;2026-05-18T22:59:37Z&#34;&#xA;conditions:&#xA;- lastTransitionTime: &#34;2026-05-18T22:59:37Z&#34;&#xA;  message: &#39;&#34;step-assert&#34; exited with code 1: Error&#39;&#xA;  reason: StepFailed&#xA;  status: &#34;False&#34;&#xA;  type: Succeeded&#xA;podName: verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#xA;provenance:&#xA;  featureFlags:&#xA;    awaitSidecarReadiness: true&#xA;    coschedule: workspaces&#xA;    enableAPIFields: alpha&#xA;    enableParamEnum: true&#xA;    enableProvenanceInStatus: true&#xA;    enforceNonfalsifiability: none&#xA;    maxResultSize: 4096&#xA;    resultExtractionMethod: termination-message&#xA;    runningInEnvWithInjectedSidecars: true&#xA;    verificationNoMatchPolicy: ignore&#xA;  refSource:&#xA;    digest:&#xA;      sha256: 7df8d121c09999d0376e189c1eb8a8263078aab697aa5ee966512f581427a6ce&#xA;    entryPoint: verify-enterprise-contract&#xA;    uri: quay.io/conforma/tekton-task&#xA;results:&#xA;- name: TEST_OUTPUT&#xA;  type: string&#xA;  value: |&#xA;    {&#34;timestamp&#34;:&#34;1779145175&#34;,&#34;namespace&#34;:&#34;&#34;,&#34;successes&#34;:0,&#34;failures&#34;:2,&#34;warnings&#34;:0,&#34;result&#34;:&#34;FAILURE&#34;}&#xA;spanContext:&#xA;  traceparent: 00-50565505e1e250bce12ac439ec9e579d-bb29422d8200ede4-01&#xA;startTime: &#34;2026-05-18T22:59:18Z&#34;&#xA;steps:&#xA;- container: step-initialize-tuf&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: initialize-tuf&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://fe7dad47dae42616bf91e93743c0b249d1e01378723c9ece737a0b38e9f3c267&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:32Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:32Z&#34;&#xA;  terminationReason: Skipped&#xA;- container: step-reduce&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: reduce&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://95da192c9b30e070e328f4967cf74a5c6fda829a30d7532a10826aff0ebf5412&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:32Z&#34;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:32Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-validate&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: validate&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://f7ce43b0401ee7348ae801abed3309fc93880dea91be09143301d1bf84efa8bb&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:35Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:32Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-report-json&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: report-json&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://f0ad3bd2fc188f6fd98acda9cc21d9db8d441f47c7fcc3650f80daed0432ae37&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-summary&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: summary&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://e8bcbcaaf3a6781f1c8ef64c8f9cdca3654ceff94829c58f638deacae417e46d&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-version&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: version&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://a168432700c1ec0f673a064aba4deeb6bb5fa449d3fd569b9e430424175ec383&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-show-config&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: show-config&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://f4526f46ca8d05a05d644a130d5bb4a1d0300797b7af355d39119f84e6e9a9fb&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-detailed-report&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: detailed-report&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://929eb3fd7af77e4cb3b6f6d4d82f93b55be38324817c274088e4242a07ffc374&#xA;    exitCode: 0&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Completed&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Completed&#xA;- container: step-assert&#xA;  imageID: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;  name: assert&#xA;  provenance: {}&#xA;  terminated:&#xA;    containerID: cri-o://971c4f10284de7958696b0d2eb11c8676100db92a8481c6b190486b05d661dae&#xA;    exitCode: 1&#xA;    finishedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;    message: &#39;[{&#34;key&#34;:&#34;TEST_OUTPUT&#34;,&#34;value&#34;:&#34;{\&#34;timestamp\&#34;:\&#34;1779145175\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:0,\&#34;failures\&#34;:2,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#34;type&#34;:1}]&#39;&#xA;    reason: Error&#xA;    startedAt: &#34;2026-05-18T22:59:36Z&#34;&#xA;  terminationReason: Error&#xA;taskSpec:&#xA;  description: Verify the enterprise contract is met&#xA;  params:&#xA;  - description: |&#xA;      Spec section of an ApplicationSnapshot resource. Not all fields of the&#xA;      resource are required. A minimal example:&#xA;&#xA;      ```json&#xA;        {&#xA;          &#34;components&#34;: [&#xA;            {&#xA;              &#34;containerImage&#34;: &#34;quay.io/example/repo:latest&#34;&#xA;            }&#xA;          ]&#xA;        }&#xA;      ```&#xA;&#xA;      Each `containerImage` in the `components` array is validated.&#xA;    name: IMAGES&#xA;    type: string&#xA;  - default: enterprise-contract-service/default&#xA;    description: |&#xA;      Name of the policy configuration (EnterpriseContractPolicy&#xA;      resource) to use. `namespace/name` or `name` syntax supported. If&#xA;      namespace is omitted the namespace where the task runs is used.&#xA;      You can also specify a policy configuration using a git url, e.g.&#xA;      `github.com/conforma/config//slsa3`.&#xA;    name: POLICY_CONFIGURATION&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Public key used to verify traditional long-lived signatures. Must&#xA;      be a valid k8s cosign reference, e.g. k8s://my-space/my-secret where my-secret&#xA;      contains the expected cosign.pub attribute. Required for traditional signing&#xA;      key verification. Will be ignored if any of CERTIFICATE_IDENTITY, CERTIFICATE_IDENTITY_REGEXP,&#xA;      CERTIFICATE_OIDC_ISSUER, or CERTIFICATE_OIDC_ISSUER_REGEXP are provided.&#xA;    name: PUBLIC_KEY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Rekor host for transparency log lookups&#xA;    name: REKOR_HOST&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected identity in the signing certificate for keyless verification.&#xA;      This should be the email or URI that was used when signing. You should provide&#xA;      both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification.&#xA;      The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_IDENTITY&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Expected OIDC issuer in the signing certificate for keyless verification.&#xA;      This should match the issuer that provided the identity token used for signing.&#xA;      You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for&#xA;      keyless verification. The PUBLIC_KEY param will be ignored if this is provided.&#xA;    name: CERTIFICATE_OIDC_ISSUER&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will&#xA;      be matched. Note that CERTIFICATE_IDENTITY takes precedence over this if both&#xA;      are present.&#xA;    name: CERTIFICATE_IDENTITY_REGEXP&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched.&#xA;      Note that CERTIFICATE_OIDC_ISSUER takes precedence over this if both are present.&#xA;    name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Skip Rekor transparency log checks during validation. Compatible&#xA;      with traditional signing secret signature checks only. If any of the CERTIFICATE_*&#xA;      keyless verification params are present, this value is disregarded and Rekor&#xA;      transparency log checks are included.&#xA;    name: IGNORE_REKOR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: TUF mirror URL. Provide a value when NOT using public sigstore deployment.&#xA;    name: TUF_MIRROR&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Path to a directory containing SSL certs to be used when communicating&#xA;      with external services. This is useful when using the integrated registry&#xA;      and a local instance of Rekor on a development cluster which may use&#xA;      certificates issued by a not-commonly trusted root CA. In such cases,&#xA;      `/var/run/secrets/kubernetes.io/serviceaccount` is a good value. Multiple&#xA;      paths can be provided by using the `:` separator.&#xA;    name: SSL_CERT_DIR&#xA;    type: string&#xA;  - default: trusted-ca&#xA;    description: The name of the ConfigMap to read CA bundle data from.&#xA;    name: CA_TRUST_CONFIGMAP_NAME&#xA;    type: string&#xA;  - default: ca-bundle.crt&#xA;    description: The name of the key in the ConfigMap that contains the CA bundle&#xA;      data.&#xA;    name: CA_TRUST_CONFIG_MAP_KEY&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Include rule titles and descriptions in the output. Set to `&#34;false&#34;`&#xA;      to disable it.&#xA;    name: INFO&#xA;    type: string&#xA;  - default: &#34;true&#34;&#xA;    description: Fail the task if policy fails. Set to `&#34;false&#34;` to disable it.&#xA;    name: STRICT&#xA;    type: string&#xA;  - default: /tekton/home&#xA;    description: Value for the HOME environment variable.&#xA;    name: HOMEDIR&#xA;    type: string&#xA;  - default: now&#xA;    description: Run policy checks with the provided time.&#xA;    name: EFFECTIVE_TIME&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: Merge additional Rego variables into the policy data. Use syntax&#xA;      &#34;key=value,key2=value2...&#34;&#xA;    name: EXTRA_RULE_DATA&#xA;    type: string&#xA;  - default: &#34;1&#34;&#xA;    description: Number of parallel workers to use for policy evaluation.&#xA;    name: WORKERS&#xA;    type: string&#xA;  - default: &#34;false&#34;&#xA;    description: Reduce the Snapshot to only the component whose build caused the&#xA;      Snapshot to be created&#xA;    name: SINGLE_COMPONENT&#xA;    type: string&#xA;  - default: unknown&#xA;    description: |&#xA;      Name, including kind, of the Kubernetes resource to query for labels when single component mode is enabled, e.g. pr/somepipeline.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE&#xA;    type: string&#xA;  - default: &#34;&#34;&#xA;    description: |&#xA;      Kubernetes namespace where the SINGLE_COMPONENT_NAME is found. Only used when single component mode is enabled.&#xA;    name: SINGLE_COMPONENT_CUSTOM_RESOURCE_NS&#xA;    type: string&#xA;  - default: 1s&#xA;    description: Base duration for exponential backoff calculation (e.g., &#34;1s&#34;, &#34;500ms&#34;)&#xA;    name: RETRY_DURATION&#xA;    type: string&#xA;  - default: &#34;2.0&#34;&#xA;    description: Exponential backoff multiplier (e.g., &#34;2.0&#34;, &#34;1.5&#34;)&#xA;    name: RETRY_FACTOR&#xA;    type: string&#xA;  - default: &#34;0.1&#34;&#xA;    description: Randomness factor for backoff calculation (0.0-1.0, e.g., &#34;0.1&#34;,&#xA;      &#34;0.2&#34;)&#xA;    name: RETRY_JITTER&#xA;    type: string&#xA;  - default: &#34;3&#34;&#xA;    description: Maximum number of retry attempts&#xA;    name: RETRY_MAX_RETRY&#xA;    type: string&#xA;  - default: 3s&#xA;    description: Maximum wait time between retries (e.g., &#34;3s&#34;, &#34;10s&#34;)&#xA;    name: RETRY_MAX_WAIT&#xA;    type: string&#xA;  results:&#xA;  - description: Short summary of the policy evaluation for each image&#xA;    name: TEST_OUTPUT&#xA;    type: string&#xA;  stepTemplate:&#xA;    computeResources: {}&#xA;    env:&#xA;    - name: HOME&#xA;      value: /tekton/home&#xA;  steps:&#xA;  - args:&#xA;    - sigstore&#xA;    - initialize&#xA;    - --mirror&#xA;    - &#34;&#34;&#xA;    - --root&#xA;    - /root.json&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: initialize-tuf&#xA;    when:&#xA;    - operator: notin&#xA;      values:&#xA;      - &#34;&#34;&#xA;  - command:&#xA;    - reduce-snapshot.sh&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    env:&#xA;    - name: SNAPSHOT&#xA;      value: &#39;{&#34;application&#34;:&#34;&#34;,&#34;componentGroup&#34;:&#34;&#34;,&#34;components&#34;:[{&#34;name&#34;:&#34;&#34;,&#34;version&#34;:&#34;&#34;,&#34;containerImage&#34;:&#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;:{}}],&#34;artifacts&#34;:{}}&#39;&#xA;    - name: SINGLE_COMPONENT&#xA;      value: &#34;false&#34;&#xA;    - name: CUSTOM_RESOURCE&#xA;      value: unknown&#xA;    - name: CUSTOM_RESOURCE_NAMESPACE&#xA;    - name: SNAPSHOT_PATH&#xA;      value: /tekton/home/snapshot.json&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: reduce&#xA;    onError: continue&#xA;  - computeResources:&#xA;      limits:&#xA;        memory: 2Gi&#xA;      requests:&#xA;        cpu: 1800m&#xA;        memory: 2Gi&#xA;    env:&#xA;    - name: POLICY_CONFIGURATION&#xA;      value: ec-policy&#xA;    - name: PUBLIC_KEY&#xA;      value: k8s://chains-e2e-wsuk/dummy-public-key-enrqrbtoch&#xA;    - name: CERTIFICATE_IDENTITY&#xA;    - name: CERTIFICATE_OIDC_ISSUER&#xA;    - name: CERTIFICATE_IDENTITY_REGEXP&#xA;    - name: CERTIFICATE_OIDC_ISSUER_REGEXP&#xA;    - name: REKOR_HOST&#xA;    - name: IGNORE_REKOR&#xA;      value: &#34;true&#34;&#xA;    - name: WORKERS&#xA;      value: &#34;1&#34;&#xA;    - name: INFO&#xA;      value: &#34;true&#34;&#xA;    - name: EFFECTIVE_TIME&#xA;      value: now&#xA;    - name: EXTRA_RULE_DATA&#xA;    - name: RETRY_MAX_WAIT&#xA;      value: 3s&#xA;    - name: RETRY_MAX_RETRY&#xA;      value: &#34;3&#34;&#xA;    - name: RETRY_DURATION&#xA;      value: 1s&#xA;    - name: RETRY_FACTOR&#xA;      value: &#34;2.0&#34;&#xA;    - name: RETRY_JITTER&#xA;      value: &#34;0.1&#34;&#xA;    - name: HOMEDIR&#xA;      value: /tekton/home&#xA;    - name: SSL_CERT_DIR&#xA;      value: /tekton-custom-certs:/etc/ssl/certs:/etc/pki/tls/certs:/system/etc/security/cacerts:/var/run/secrets/kubernetes.io/serviceaccount&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: validate&#xA;    onError: continue&#xA;    script: |&#xA;      #!/bin/bash&#xA;      set -euo pipefail&#xA;&#xA;      cmd_args=(&#xA;        validate&#xA;        image&#xA;        --images=&#34;${HOMEDIR}/snapshot.json&#34;&#xA;        --policy=&#34;${POLICY_CONFIGURATION}&#34;&#xA;      )&#xA;&#xA;      # To keep bash logic as thin as possible we deliberately don&#39;t sanitize&#xA;      # these params. If something is wrong or missing let Conforma handle it.&#xA;&#xA;      if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ] || \&#xA;         [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;        # If *any* of the above are non-empty assume the intention is to&#xA;        # try keyless verification&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_IDENTITY}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity=&#34;${CERTIFICATE_IDENTITY}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_IDENTITY_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-identity-regexp=&#34;${CERTIFICATE_IDENTITY_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        if [ -n &#34;${CERTIFICATE_OIDC_ISSUER}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer=&#34;${CERTIFICATE_OIDC_ISSUER}&#34;&#xA;          )&#xA;        elif [ -n &#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34; ]; then&#xA;          cmd_args+=(&#xA;            --certificate-oidc-issuer-regexp=&#34;${CERTIFICATE_OIDC_ISSUER_REGEXP}&#34;&#xA;          )&#xA;        fi&#xA;&#xA;        # Force --ignore-rekor to false since we need rekor&#xA;        cmd_args+=(&#xA;          --ignore-rekor=false&#xA;        )&#xA;      else&#xA;        # Assume traditional signing secret verification&#xA;        cmd_args+=(&#xA;          --public-key=&#34;${PUBLIC_KEY}&#34;&#xA;          --ignore-rekor=&#34;${IGNORE_REKOR}&#34;&#xA;        )&#xA;      fi&#xA;&#xA;      cmd_args+=(&#xA;        --rekor-url=&#34;${REKOR_HOST}&#34;&#xA;        --workers=&#34;${WORKERS}&#34;&#xA;        --info=&#34;${INFO}&#34;&#xA;        --timeout=0&#xA;        --strict=false&#xA;        --show-successes=true&#xA;        --show-policy-docs-link=true&#xA;        --effective-time=&#34;${EFFECTIVE_TIME}&#34;&#xA;        --extra-rule-data=&#34;${EXTRA_RULE_DATA}&#34;&#xA;        --retry-max-wait=&#34;${RETRY_MAX_WAIT}&#34;&#xA;        --retry-max-retry=&#34;${RETRY_MAX_RETRY}&#34;&#xA;        --retry-duration=&#34;${RETRY_DURATION}&#34;&#xA;        --retry-factor=&#34;${RETRY_FACTOR}&#34;&#xA;        --retry-jitter=&#34;${RETRY_JITTER}&#34;&#xA;        --output=&#34;text=${HOMEDIR}/text-report.txt?show-successes=false&#34;&#xA;        --output=&#34;json=${HOMEDIR}/report-json.json&#34;&#xA;        --output=&#34;appstudio=/tekton/results/TEST_OUTPUT&#34;&#xA;      )&#xA;&#xA;&#xA;      # Execute Conforma with constructed arguments&#xA;      exec ec &#34;${cmd_args[@]}&#34;&#xA;    volumeMounts:&#xA;    - mountPath: /etc/pki/tls/certs/ca-custom-bundle.crt&#xA;      name: trusted-ca&#xA;      readOnly: true&#xA;      subPath: ca-bundle.crt&#xA;  - args:&#xA;    - jq . /tekton/home/report-json.json | awk &#39;{gsub(/^ +/, &#34;&#34;); acc += length; if&#xA;      (acc &gt;= 8000) { printf &#34;\n&#34;; acc=length } printf $0 }&#39;&#xA;    command:&#xA;    - sh&#xA;    - -c&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: report-json&#xA;    onError: continue&#xA;  - args:&#xA;    - .&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: summary&#xA;    onError: continue&#xA;  - args:&#xA;    - version&#xA;    command:&#xA;    - ec&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: version&#xA;  - args:&#xA;    - &#39;{policy: .policy, key: .key, &#34;effective-time&#34;: .[&#34;effective-time&#34;]}&#39;&#xA;    - /tekton/home/report-json.json&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: show-config&#xA;  - args:&#xA;    - /tekton/home/text-report.txt&#xA;    command:&#xA;    - cat&#xA;    computeResources: {}&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: detailed-report&#xA;    onError: continue&#xA;  - args:&#xA;    - --argjson&#xA;    - strict&#xA;    - &#34;true&#34;&#xA;    - -e&#xA;    - |&#xA;      .result == &#34;SUCCESS&#34; or .result == &#34;WARNING&#34; or ($strict | not)&#xA;    - /tekton/results/TEST_OUTPUT&#xA;    command:&#xA;    - jq&#xA;    computeResources:&#xA;      limits:&#xA;        memory: 256Mi&#xA;      requests:&#xA;        cpu: 100m&#xA;        memory: 256Mi&#xA;    image: quay.io/conforma/cli@sha256:2f5bed7fd51f678ea960aaf5bed033412b7d207a83bb1b02b108be5ca71a058d&#xA;    name: assert&#xA;  volumes:&#xA;  - configMap:&#xA;      items:&#xA;      - key: ca-bundle.crt&#xA;        path: ca-bundle.crt&#xA;      name: trusted-ca&#xA;      optional: true&#xA;    name: trusted-ca&#xA;  workspaces:&#xA;  - description: The workspace where the snapshot spec json file resides&#xA;    name: data&#xA;    optional: true&#xA;&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-initialize-tuf&#39;:&#xA;----- START -----2026/05/18 22:59:32 INFO Step was skipped due to when expressions were evaluated to false.&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-reduce&#39;:&#xA;----- START -----Single Component mode? false&#xA;{&#xA;  &#34;application&#34;: &#34;&#34;,&#xA;  &#34;componentGroup&#34;: &#34;&#34;,&#xA;  &#34;components&#34;: [&#xA;    {&#xA;      &#34;name&#34;: &#34;&#34;,&#xA;      &#34;version&#34;: &#34;&#34;,&#xA;      &#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images:buildah-demo-xbyltndmbb@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#xA;      &#34;source&#34;: {}&#xA;    }&#xA;  ],&#xA;  &#34;artifacts&#34;: {}&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-validate&#39;:&#xA;----- START ---------- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENZxkE/d0fKvJ51dXHQmxXaRMTtVz\nBQWcmJD/7pcMDEmBcmk8O1yUPIiFj5TMZqabjS9CQQN+jKHG+Bfi0BYlHg==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/dummy-public-key-enrqrbtoch&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T22:59:32.769625469Z&#34;}----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-summary&#39;:&#xA;----- START -----{&#xA;  &#34;timestamp&#34;: &#34;1779145175&#34;,&#xA;  &#34;namespace&#34;: &#34;&#34;,&#xA;  &#34;successes&#34;: 0,&#xA;  &#34;failures&#34;: 2,&#xA;  &#34;warnings&#34;: 0,&#xA;  &#34;result&#34;: &#34;FAILURE&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-version&#39;:&#xA;----- START -----Version            v0.9.25&#xA;Source ID          b345847182602d9a5ce9e957fa76fe02575c8018&#xA;Change date        2026-04-27 12:52:43 +0000 UTC (3 weeks ago)&#xA;ECC                v0.1.7&#xA;OPA                v1.15.2&#xA;Conftest           v0.68.2&#xA;Cosign             v3.0.4&#xA;Sigstore           v1.10.4&#xA;Rekor              v1.5.0&#xA;Tekton Pipeline    v1.9.2&#xA;Kubernetes Client  v0.35.0&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-show-config&#39;:&#xA;----- START -----{&#xA;  &#34;policy&#34;: {&#xA;    &#34;name&#34;: &#34;Default&#34;,&#xA;    &#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#xA;    &#34;sources&#34;: [&#xA;      {&#xA;        &#34;name&#34;: &#34;Default&#34;,&#xA;        &#34;policy&#34;: [&#xA;          &#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;&#xA;        ],&#xA;        &#34;data&#34;: [&#xA;          &#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#xA;          &#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;&#xA;        ],&#xA;        &#34;config&#34;: {&#xA;          &#34;include&#34;: [&#xA;            &#34;slsa_provenance_available&#34;&#xA;          ]&#xA;        }&#xA;      }&#xA;    ],&#xA;    &#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/dummy-public-key-enrqrbtoch&#34;&#xA;  },&#xA;  &#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENZxkE/d0fKvJ51dXHQmxXaRMTtVz\nBQWcmJD/7pcMDEmBcmk8O1yUPIiFj5TMZqabjS9CQQN+jKHG+Bfi0BYlHg==\n-----END PUBLIC KEY-----\n&#34;,&#xA;  &#34;effective-time&#34;: &#34;2026-05-18T22:59:32.769625469Z&#34;&#xA;}&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-detailed-report&#39;:&#xA;----- START -----Success: false&#xA;Result: FAILURE&#xA;Violations: 2, Warnings: 0, Successes: 0&#xA;Component: &#xA;ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;&#xA;Results:&#xA;✕ [Violation] builtin.attestation.signature_check&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;  Reason: No image attestations found matching the given public key. Verify the correct public key was provided, and one or more&#xA;  attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#xA;  Title: Attestation signature check passed&#xA;  Description: The attestation signature matches available signing materials.&#xA;&#xA;✕ [Violation] builtin.image.signature_check&#xA;  ImageRef: quay.io/redhat-appstudio-qe/test-images@sha256:cda5989fd4b667a87e672e8153730d5b24f71fef426f70441156a1f7d32b6db7&#xA;  Reason: No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was&#xA;  created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature&#xA;   invalid signature when validating ASN.1 encoded signature&#xA;   invalid signature when validating ASN.1 encoded signature&#xA;  Title: Image signature check passed&#xA;  Description: The image signature matches available signing materials.&#xA;&#xA;For more information about policy issues, see the policy documentation: https://conforma.dev/docs/policy/&#xA;----- END -----&#xA;*** Logs from pod &#39;verify-enterprise-contract-f5d560bf08f99f1900df1d41f01fe11a-pod&#39;, container &#39;step-assert&#39;:&#xA;----- START -----false&#xA;----- END -----&#xA;Make sure TaskRun verify-enterprise-contract of PipelineRun verify-enterprise-contract-run-xp6tp failed&#xA;&lt; Exit [It] fails when unexpected signature is used - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:251 @ 05/18/26 22:59:37.986 (20.228s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:37.986&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:37.986 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec cli has error handling [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="14.098401506">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:37.986&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:38.002 (16ms)&#xA;&gt; Enter [It] verifies ec cli has error handling - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:279 @ 05/18/26 22:59:38.003&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-c64wb&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-c64wb&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-af3d6f56e68969fa548ad438af953a5a-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: false,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:f1f3150e87adfcf44f0ea5fa468d4fe93b80e2c0d49ee31580407a5f1208d0a2&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false},{&#34;name&#34;: &#34;-sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0-amd64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false},{&#34;name&#34;: &#34;-sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63-arm64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63&#34;,&#34;source&#34;: {},&#34;violations&#34;: [{&#34;msg&#34;: &#34;No image attestations found matching the given public key. Verify the correct public key was provided, and one or more attestations were created. Error: no matching attestations: accepted signatures do not match threshold, Found: 0, Expected 1&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;No image signatures found matching the given public key. Verify the correct public key was provided, and a signature was created. Error: no matching signatures: invalid signature when validating ASN.1 encoded signature\n invalid signature when validating ASN.1 encoded signature&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}}],&#34;success&#34;: false}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZV8zPPBJOtpA9VfpxW7c8I/n5eNt\nNsoy49zY0DmkIRuMT4O2jq68ulUZZEL1jVDc+fwrrqgGvBfHup2IO77UhA==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;include&#34;: [&#34;slsa_provenance_available&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/cosign-public-key&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T22:59:45.083790628Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies ec cli has error handling - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:279 @ 05/18/26 22:59:52.085 (14.082s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:52.085&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 22:59:52.085 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task ec-cli command verifies ec validate accepts a list of image references [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="passed" time="21.153883488">
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:52.085&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 22:59:52.102 (17ms)&#xA;&gt; Enter [It] verifies ec validate accepts a list of image references - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:301 @ 05/18/26 22:59:52.102&#xA;Update public key to verify golden images&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-8hq7c&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-8hq7c&#34; to finish&#xA;*** Logs from pod &#39;verify-enterprise-contract-99b74af8861543af4c45317a626705e8-pod&#39;, container &#39;step-report-json&#39;:&#xA;----- START -----{&#34;success&#34;: true,&#34;components&#34;: [{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:f1f3150e87adfcf44f0ea5fa468d4fe93b80e2c0d49ee31580407a5f1208d0a2&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIBq18yWVAorXyPPujnxOZ8mHF27hiJQ6EAno4Tjv33YSAiAcU67ZBZRjdijTh/A/83Fk9Ixw85yDTJBi/oDjYPGgMA==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;-sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0-amd64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:c100497badd3edd2f02b294411b511396e71caf701f4df45db448e6cdbc686b0&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#xA;&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHxTtFk2bdTapnn7KctPkokRxcv93bMICQzKn39JKl0LAiBCxnJjATuj6BTcqLlA8wMoi6veCojTO4/4C5LttuGMHA==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEYCIQC+dYCC62hMKwiuaN96kH3W0IDnI3Q0dORmRturzbbB4wIhAMZtr0VklbfgVlU56eO49dlwq8pKtye2zerYiC8NazW4&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;-sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63-arm64&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:9024c5db8db1fa036f7c56020829f0e239db7b660d5e5f6439af84ab66489d63&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#xA;&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIFQ78YKKqW5FcHcpAdeQwKgDS/Mo7tWGNvEsIaFU+8gaAiBaGO5O2kkl2eEedoP4ZiBaS720B45IeoIObcy+IgqRyQ==&#34;},{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEQCIHYpELtYjBZyeFW0mhT81Ko6wYTTi+Kr1iwU+pPtxOxeAiB6BJKk+Tmh9gdvkDL2snwVXBsjmPwd0rUaPseGWVHzCQ==&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIB3dH/CuxExH77jGOhngRyCwsNeug1KyBLQKKWqW0qF/AiEAw8EQ0dR5hgbJ/tlxqAA33VypQMBitTw6kMhgcR8Z/kM=&#34;}]}]},{&#34;name&#34;: &#34;&#34;,&#34;containerImage&#34;: &#34;quay.io/konflux-ci/ec-golden-image@sha256:304040ca1911aa4d911bd7c6d6d07193c57dc49dbc43e63828b42ab204fb1b25&#34;,&#34;source&#34;: {},&#34;successes&#34;: [{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.known_attestation_type&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.pipelinerun_attestation_found&#34;],&#34;description&#34;: &#34;Confirm the attestation found for the image has a known attestation type.&#34;,&#34;title&#34;: &#34;Known attestation type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;attestation_type.pipelinerun_attestation_found&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;description&#34;: &#34;Confirm at least one PipelineRun attestation is present.&#34;,&#34;title&#34;: &#34;PipelineRun attestation found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#xA;&#34;code&#34;: &#34;builtin.attestation.signature_check&#34;,&#34;description&#34;: &#34;The attestation signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Attestation signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.attestation.syntax_check&#34;,&#34;description&#34;: &#34;The attestation has correct syntax.&#34;,&#34;title&#34;: &#34;Attestation syntax check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;builtin.image.signature_check&#34;,&#34;description&#34;: &#34;The image signature matches available signing materials.&#34;,&#34;title&#34;: &#34;Image signature check passed&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.allowed_builder_ids_provided&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_builder_ids` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed builder IDs provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_accepted&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set to one of the values in the `allowed_builder_ids` rule data, e.g. \&#34;https://tekton.dev/chains/v2\&#34;.&#34;,&#34;title&#34;: &#34;SLSA Builder ID is known and accepted&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_build_service.slsa_builder_id_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the attestation attribute predicate.builder.id is set.&#34;,&#34;title&#34;: &#34;SLSA Builder ID found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_script_used&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicate.buildConfig.tasks.steps attribute for the task responsible for building and pushing the image is not empty.&#34;,&#34;title&#34;: &#34;Build task contains steps&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.build_task_image_results_found&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm that a build task exists and it has the expected IMAGE_DIGEST and IMAGE_URL task results.&#34;,&#34;title&#34;: &#34;Build task set image digest and url task results&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_build_scripted_build.subject_build_task_matches&#34;,&#34;collections&#34;: [&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify the subject of the attestations matches the IMAGE_DIGEST and IMAGE_URL values from the build task.&#34;,&#34;title&#34;: &#34;Provenance subject matches build task image result&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.allowed_predicate_types_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the `allowed_predicate_types` rule data was provided, since it is required by the policy rules in this package.&#34;,&#34;title&#34;: &#34;Allowed predicate types provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_provenance_available.attestation_predicate_type_accepted&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.&#34;,&#34;title&#34;: &#34;Expected attestation predicate type found&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.attested_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Attestation contains source reference.&#34;,&#34;title&#34;: &#34;Source reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.expected_source_code_reference&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Verify that the provided source code reference is the one being attested.&#34;,&#34;title&#34;: &#34;Expected source code reference&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_correlated.rule_data_provided&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;policy_data&#34;],&#34;description&#34;: &#34;Confirm the expected rule data keys have been provided in the expected format. The keys are `supported_vcs` and `supported_digests`.&#34;,&#34;title&#34;: &#34;Rule data provided&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_format_okay&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Confirm at least one entry in the predicate.materials array of the attestation contains the expected attributes: uri and digest.sha1.&#34;,&#34;title&#34;: &#34;Materials have uri and digest&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_include_git_sha&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that each entry in the predicate.materials array with a SHA-1 digest includes a valid Git commit SHA.&#34;,&#34;title&#34;: &#34;Materials include git commit shas&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;slsa_source_version_controlled.materials_uri_is_git_repo&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;slsa3&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure each entry in the predicate.materials array with a SHA-1 digest includes a valid Git URI.&#34;,&#34;title&#34;: &#34;Material uri is a git repo&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.pipeline_has_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;attestation_type.known_attestation_type&#34;],&#34;description&#34;: &#34;Ensure that at least one Task is present in the PipelineRun attestation.&#34;,&#34;title&#34;: &#34;Pipeline run includes at least one task&#34;}},{&#34;msg&#34;: &#34;Pass&#34;,&#34;metadata&#34;: {&#34;code&#34;: &#34;tasks.successful_pipeline_tasks&#34;,&#34;collections&#34;: [&#34;minimal&#34;,&#34;redhat&#34;,&#34;redhat_rpms&#34;,&#34;slsa3&#34;],&#34;depends_on&#34;: [&#34;tasks.pipeline_has_tasks&#34;],&#34;description&#34;: &#34;Ensure that all of the Tasks in the Pipeline completed successfully. Note that skipped Tasks are not taken into account and do not influence the outcome.&#34;,&#34;title&#34;: &#34;Successful pipeline tasks&#34;}}],&#34;success&#34;: true,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;&#34;,&#34;sig&#34;: &#34;MEUCIQD86lmOqCovYZDPKm0XxxsLgDQcFIFAv+QZxrFSHmCvQAIgTd1I005ox8MfABqsAen6PZEyg2MCEQNBCx1NLS3V0JQ=&#34;}],&#34;attestations&#34;: [{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/TaskRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEUCIQDcgZIwEkLFqD7U9HrobgEC8Jo7wm+xJ5AoyO3qg+aj8QIgb9xDpjYGRMmpVk+QATeVKlHonzBiu51HtT3J+lQXPXc=&#34;}]},{&#34;type&#34;: &#34;https://in-toto.io/Statement/v0.1&#34;,&#34;predicateType&#34;: &#34;https://slsa.dev/provenance/v0.2&#34;,&#34;predicateBuildType&#34;: &#34;tekton.dev/v1beta1/PipelineRun&#34;,&#34;signatures&#34;: [{&#34;keyid&#34;: &#34;SHA256:IhiN7gY+Z3uSSd7tmj6w5Zfhqafzdhm3DZjIvGc6iYY&#34;,&#34;sig&#34;: &#34;MEYCIQDKSihaAR/zAhJhR5GCqleDvfUUtvRw61vk0YeTBAnOSQIhAKa09B4yEfaSJronmWBFbu5cVPNxm17CMl/PElEz1POa&#34;}]}]}],&#34;key&#34;: &#34;-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEZP/0htjhVt2y0ohjgtIIgICOtQtA\nnaYJRuLprwIv6FDhZ5yFjYUEtsmoNcW7rx2KM6FOXGsCX3BNc7qhHELT+g==\n-----END PUBLIC KEY-----\n&#34;,&#34;policy&#34;: {&#34;name&#34;: &#34;Default&#34;,&#34;description&#34;: &#34;Includes rules for levels 1, 2 &amp; 3 of SLSA v0.1. This is the default config used for new Konflux applications. Source: https://github.com/conforma/config/blob/main/default/policy.yaml&#34;,&#34;sources&#34;: [{&#34;name&#34;: &#34;Default&#34;,&#34;policy&#34;: [&#34;oci::quay.io/enterprise-contract/ec-release-policy:konflux@sha256:9576b1a2f6ee310993603f7c5cc78823af717fd2eec166bb5ca25103894dc1a5&#34;],&#34;data&#34;: [&#34;git::github.com/release-engineering/rhtap-ec-policy//data?ref=4a7cd0f8839ab7364f5cb8ead482684db40b737d&#34;,&#34;oci::quay.io/konflux-ci/tekton-catalog/data-acceptable-bundles:latest@sha256:82de347088848fa709122b571ba53ccc5e510fbd8f8cf077e43f40642611a188&#34;,&#xA;&#34;oci::quay.io/konflux-ci/konflux-vanguard/data-acceptable-bundles:latest@sha256:0b31c7bc77a7463a1bc52f3d3625ef0e0e75443da7fd2de8005d7885282138ea&#34;,&#34;oci::quay.io/konflux-ci/integration-service-catalog/data-acceptable-bundles:latest@sha256:7b00455045ea3873a72caeb1e7ac7d036bd53963a26409891a4cc9d0d242b9fc&#34;],&#34;config&#34;: {&#34;exclude&#34;: [&#34;slsa_source_correlated.source_code_reference_provided&#34;],&#34;include&#34;: [&#34;@slsa3&#34;]}}],&#34;publicKey&#34;: &#34;k8s://chains-e2e-wsuk/golden-image-public-keyvigmrwijrc&#34;},&#34;ec-version&#34;: &#34;v0.9.25&#34;,&#34;effective-time&#34;: &#34;2026-05-18T23:00:00.654114543Z&#34;}----- END -----&#xA;&lt; Exit [It] verifies ec validate accepts a list of image references - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:301 @ 05/18/26 23:00:13.239 (21.137s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 23:00:13.239&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 23:00:13.239 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies redhat products pass the redhat policy rule collection before release  [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="failed" time="32.600593068">
              <failure message="Expected&#xA;    &lt;[]v1.TaskRunResult | len:1, cap:1&gt;: [&#xA;        {&#xA;            Name: &#34;TEST_OUTPUT&#34;,&#xA;            Type: &#34;string&#34;,&#xA;            Value: {&#xA;                Type: &#34;string&#34;,&#xA;                StringVal: &#34;{\&#34;timestamp\&#34;:\&#34;1779145243\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:405,\&#34;failures\&#34;:3,\&#34;warnings\&#34;:27,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#xA;                ArrayVal: nil,&#xA;                ObjectVal: nil,&#xA;            },&#xA;        },&#xA;    ]&#xA;not to contain elements&#xA;    &lt;[]*tekton.TaskRunResultMatcher | len:1, cap:1&gt;: [&#xA;        {&#xA;            name: &#34;TEST_OUTPUT&#34;,&#xA;            jsonPath: &#34;{$.result}&#34;,&#xA;            value: nil,&#xA;            jsonValue: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;            jsonMatcher: &lt;*matchers.MatchJSONMatcher | 0xc0011c9f50&gt;{&#xA;                JSONToMatch: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;                firstFailurePath: nil,&#xA;            },&#xA;        },&#xA;    ]" type="failed">[FAILED] Expected&#xA;    &lt;[]v1.TaskRunResult | len:1, cap:1&gt;: [&#xA;        {&#xA;            Name: &#34;TEST_OUTPUT&#34;,&#xA;            Type: &#34;string&#34;,&#xA;            Value: {&#xA;                Type: &#34;string&#34;,&#xA;                StringVal: &#34;{\&#34;timestamp\&#34;:\&#34;1779145243\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:405,\&#34;failures\&#34;:3,\&#34;warnings\&#34;:27,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#xA;                ArrayVal: nil,&#xA;                ObjectVal: nil,&#xA;            },&#xA;        },&#xA;    ]&#xA;not to contain elements&#xA;    &lt;[]*tekton.TaskRunResultMatcher | len:1, cap:1&gt;: [&#xA;        {&#xA;            name: &#34;TEST_OUTPUT&#34;,&#xA;            jsonPath: &#34;{$.result}&#34;,&#xA;            value: nil,&#xA;            jsonValue: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;            jsonMatcher: &lt;*matchers.MatchJSONMatcher | 0xc0011c9f50&gt;{&#xA;                JSONToMatch: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;                firstFailurePath: nil,&#xA;            },&#xA;        },&#xA;    ]&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:378 @ 05/18/26 23:00:45.647&#xA;</failure>
              <system-err>&gt; Enter [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 23:00:13.24&#xA;&lt; Exit [BeforeEach] verify-enterprise-contract task - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:154 @ 05/18/26 23:00:13.264 (24ms)&#xA;&gt; Enter [It] verifies redhat products pass the redhat policy rule collection before release  - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:345 @ 05/18/26 23:00:13.264&#xA;Update public key to verify golden images&#xA;Creating Pipeline &#34;verify-enterprise-contract-run-vg4jx&#34;&#xA;Waiting for pipeline &#34;verify-enterprise-contract-run-vg4jx&#34; to finish&#xA;[FAILED] Expected&#xA;    &lt;[]v1.TaskRunResult | len:1, cap:1&gt;: [&#xA;        {&#xA;            Name: &#34;TEST_OUTPUT&#34;,&#xA;            Type: &#34;string&#34;,&#xA;            Value: {&#xA;                Type: &#34;string&#34;,&#xA;                StringVal: &#34;{\&#34;timestamp\&#34;:\&#34;1779145243\&#34;,\&#34;namespace\&#34;:\&#34;\&#34;,\&#34;successes\&#34;:405,\&#34;failures\&#34;:3,\&#34;warnings\&#34;:27,\&#34;result\&#34;:\&#34;FAILURE\&#34;}\n&#34;,&#xA;                ArrayVal: nil,&#xA;                ObjectVal: nil,&#xA;            },&#xA;        },&#xA;    ]&#xA;not to contain elements&#xA;    &lt;[]*tekton.TaskRunResultMatcher | len:1, cap:1&gt;: [&#xA;        {&#xA;            name: &#34;TEST_OUTPUT&#34;,&#xA;            jsonPath: &#34;{$.result}&#34;,&#xA;            value: nil,&#xA;            jsonValue: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;            jsonMatcher: &lt;*matchers.MatchJSONMatcher | 0xc0011c9f50&gt;{&#xA;                JSONToMatch: &lt;string&gt;&#34;[\&#34;FAILURE\&#34;]&#34;,&#xA;                firstFailurePath: nil,&#xA;            },&#xA;        },&#xA;    ]&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:378 @ 05/18/26 23:00:45.647&#xA;&lt; Exit [It] verifies redhat products pass the redhat policy rule collection before release  - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:345 @ 05/18/26 23:00:45.647 (32.383s)&#xA;&gt; Enter [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 23:00:45.647&#xA;&lt; Exit [AfterEach] [enterprise-contract-suite Conforma E2E tests] - /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:29 @ 05/18/26 23:00:45.84 (193ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task are trusted [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:382 @ 05/18/26 23:00:45.841&#xA;</system-err>
          </testcase>
          <testcase name="[It] [enterprise-contract-suite Conforma E2E tests] test creating and signing an image and task verify-enterprise-contract task Release Policy verifies the release policy: Task references are pinned [ec, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/enterprise-contract/contract.go:422 @ 05/18/26 23:00:45.841&#xA;</system-err>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws host-pool allocation when the Component with multi-platform-build is created test that cleanup happened successfully [multi-platform, aws-host-pool]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] aws dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, aws-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm system z dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmz-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created a PipelineRun is triggered [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created the build-container task from component pipelinerun is buildah-remote [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created The multi platform secret is populated [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created that PipelineRun completes successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [multi-platform-build-service-suite Multi Platform Controller E2E tests] ibm power pc dynamic allocation when the Component with multi-platform-build is created check cleanup happened successfully [multi-platform, ibmp-dynamic]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created triggers a Build PipelineRun [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="39.894466767">
              <system-err>&gt; Enter [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:45 @ 05/18/26 22:53:19.564&#xA;&lt; Exit [BeforeAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:45 @ 05/18/26 22:53:28.796 (9.231s)&#xA;&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:109 @ 05/18/26 22:53:28.796&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:109 @ 05/18/26 22:53:39.428 (10.632s)&#xA;&gt; Enter [It] triggers a Build PipelineRun - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:130 @ 05/18/26 22:53:39.428&#xA;Build PipelineRun has not been created yet for the component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;&lt; Exit [It] triggers a Build PipelineRun - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:130 @ 05/18/26 22:53:59.459 (20.031s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 22:53:59.459&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 22:53:59.459 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000283627">
              <system-err>&gt; Enter [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:144 @ 05/18/26 22:53:59.459&#xA;&lt; Exit [It] does not contain an annotation with a Snapshot Name - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:144 @ 05/18/26 22:53:59.459 (0s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 22:53:59.459&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 22:53:59.459 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="791.530498962">
              <failure message="Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0020a27c0&gt;: &#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare&#xA;    2026/05/18 23:03:53 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: &#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare&#xA;    2026/05/18 23:05:49 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: &#xA;    Starting clamd ...&#xA;    clamd is ready!&#xA;    Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.&#xA;    Detected container image. Processing image manifests.&#xA;    Running &#34;oc image extract&#34; on image of arch amd64&#xA;    Scanning image for arch amd64. This operation may take a while.&#xA;    &#xA;    ----------- SCAN SUMMARY -----------&#xA;    Infected files: 0&#xA;    Time: 51.628 sec (0 m 51 s)&#xA;    Start Date: 2026:05:18 23:06:08&#xA;    End Date:   2026:05:18 23:07:00&#xA;    Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004&#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 2&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;, &#34;digests&#34;: [&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;]}}&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    [retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;    Preparing clamscan-result-amd64.log&#xA;    Preparing clamscan-ec-test-amd64.json&#xA;    Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;    Uploading ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading 048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Uploaded  f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#xA;    Digest: sha256:f4629fc5073c95c8c366a3ade61cc0e1855aaba8d916ac877d56633946515f27&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: prepare&#xA;    2026/05/18 23:05:48 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-dm6qp&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-lz2f8&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-2-snbtz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-3-qcjnr&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-4-r4bmz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-5-bsqzg&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-introspect: &#xA;    Artifact type will be determined by introspection.&#xA;    Checking the media type of the OCI artifact...&#xA;    [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;    Looking for image labels that indicate this might be an operator bundle...&#xA;    [retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Found 0 matching labels.&#xA;    Expecting 3 or more to identify this image as an operator bundle.&#xA;    Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-generate-container-auth: &#xA;    Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Auth json written to &#34;/auth/auth.json&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-set-skip-for-bundles: &#xA;    2026/05/18 23:06:34 INFO Step was skipped due to when expressions were evaluated to false.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-check: &#xA;    time=&#34;2026-05-18T23:06:35Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.18.0 &lt;commit: f87ac516cd4eaadf7b7e75926f300971c78afeb5&gt;&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a for platform amd64&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2898642936/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a will be paired with digest sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;    {&#xA;        &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;,&#xA;        &#34;passed&#34;: false,&#xA;        &#34;test_library&#34;: {&#xA;            &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;            &#34;version&#34;: &#34;1.18.0&#34;,&#xA;            &#34;commit&#34;: &#34;f87ac516cd4eaadf7b7e75926f300971c78afeb5&#34;&#xA;        },&#xA;        &#34;results&#34;: {&#xA;            &#34;passed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                    &#34;elapsed_time&#34;: 52,&#xA;                    &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                    &#34;elapsed_time&#34;: 9096,&#xA;                    &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                    &#34;elapsed_time&#34;: 117,&#xA;                    &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;                }&#xA;            ],&#xA;            &#34;failed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                    &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                    &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                    &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                    &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;                }&#xA;            ],&#xA;            &#34;errors&#34;: []&#xA;        }&#xA;    }&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-set-outcome: &#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-final-outcome: &#xA;    + [[ ! -f /mount/konflux.results.json ]]&#xA;    + tee /tekton/steps/step-final-outcome/results/test-output&#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA;     pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | init container: prepare&#xA;    2026/05/18 23:05:50 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] digest: sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-18T23:05:54Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;    {&#xA;        s: &#34;\n pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare\n2026/05/18 23:03:53 Entrypoint initialization\n\npod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: \ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare\n2026/05/18 23:05:49 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.\nDetected container image. Processing image manifests.\nRunning \&#34;oc image extract\&#34; on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 51.628 sec (0 m 51 s)\nStart Date: 2026:05:18 23:06:08\nEnd Date:   2026:05:18 23:07:00\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004\n[\n\t{\n\t\t\&#34;filename\&#34;: \&#34;/work/logs/clamscan-result-log-amd64.json\&#34;,\n\t\t\&#34;namespace\&#34;: \&#34;required_checks\&#34;,\n\t\t\&#34;successes\&#34;: 2\n\t}\n]\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;image\&#34;: {\&#34;pullspec\&#34;: \&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\&#34;, \&#34;digests\&#34;: [\&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35\&#34;]}}\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\n[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;" type="failed">[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0020a27c0&gt;: &#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare&#xA;    2026/05/18 23:03:53 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: &#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare&#xA;    2026/05/18 23:05:49 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: &#xA;    Starting clamd ...&#xA;    clamd is ready!&#xA;    Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.&#xA;    Detected container image. Processing image manifests.&#xA;    Running &#34;oc image extract&#34; on image of arch amd64&#xA;    Scanning image for arch amd64. This operation may take a while.&#xA;    &#xA;    ----------- SCAN SUMMARY -----------&#xA;    Infected files: 0&#xA;    Time: 51.628 sec (0 m 51 s)&#xA;    Start Date: 2026:05:18 23:06:08&#xA;    End Date:   2026:05:18 23:07:00&#xA;    Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004&#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 2&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;, &#34;digests&#34;: [&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;]}}&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    [retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;    Preparing clamscan-result-amd64.log&#xA;    Preparing clamscan-ec-test-amd64.json&#xA;    Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;    Uploading ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading 048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Uploaded  f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#xA;    Digest: sha256:f4629fc5073c95c8c366a3ade61cc0e1855aaba8d916ac877d56633946515f27&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: prepare&#xA;    2026/05/18 23:05:48 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-dm6qp&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-lz2f8&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-2-snbtz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-3-qcjnr&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-4-r4bmz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-5-bsqzg&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-introspect: &#xA;    Artifact type will be determined by introspection.&#xA;    Checking the media type of the OCI artifact...&#xA;    [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;    Looking for image labels that indicate this might be an operator bundle...&#xA;    [retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Found 0 matching labels.&#xA;    Expecting 3 or more to identify this image as an operator bundle.&#xA;    Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-generate-container-auth: &#xA;    Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Auth json written to &#34;/auth/auth.json&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-set-skip-for-bundles: &#xA;    2026/05/18 23:06:34 INFO Step was skipped due to when expressions were evaluated to false.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-check: &#xA;    time=&#34;2026-05-18T23:06:35Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.18.0 &lt;commit: f87ac516cd4eaadf7b7e75926f300971c78afeb5&gt;&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a for platform amd64&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2898642936/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a will be paired with digest sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;    {&#xA;        &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;,&#xA;        &#34;passed&#34;: false,&#xA;        &#34;test_library&#34;: {&#xA;            &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;            &#34;version&#34;: &#34;1.18.0&#34;,&#xA;            &#34;commit&#34;: &#34;f87ac516cd4eaadf7b7e75926f300971c78afeb5&#34;&#xA;        },&#xA;        &#34;results&#34;: {&#xA;            &#34;passed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                    &#34;elapsed_time&#34;: 52,&#xA;                    &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                    &#34;elapsed_time&#34;: 9096,&#xA;                    &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                    &#34;elapsed_time&#34;: 117,&#xA;                    &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;                }&#xA;            ],&#xA;            &#34;failed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                    &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                    &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                    &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                    &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;                }&#xA;            ],&#xA;            &#34;errors&#34;: []&#xA;        }&#xA;    }&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-set-outcome: &#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-final-outcome: &#xA;    + [[ ! -f /mount/konflux.results.json ]]&#xA;    + tee /tekton/steps/step-final-outcome/results/test-output&#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA;     pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | init container: prepare&#xA;    2026/05/18 23:05:50 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] digest: sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-18T23:05:54Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;    {&#xA;        s: &#34;\n pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare\n2026/05/18 23:03:53 Entrypoint initialization\n\npod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: \ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare\n2026/05/18 23:05:49 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.\nDetected container image. Processing image manifests.\nRunning \&#34;oc image extract\&#34; on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 51.628 sec (0 m 51 s)\nStart Date: 2026:05:18 23:06:08\nEnd Date:   2026:05:18 23:07:00\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004\n[\n\t{\n\t\t\&#34;filename\&#34;: \&#34;/work/logs/clamscan-result-log-amd64.json\&#34;,\n\t\t\&#34;namespace\&#34;: \&#34;required_checks\&#34;,\n\t\t\&#34;successes\&#34;: 2\n\t}\n]\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;image\&#34;: {\&#34;pullspec\&#34;: \&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\&#34;, \&#34;digests\&#34;: [\&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35\&#34;]}}\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\n[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:150 @ 05/18/26 23:07:10.523&#xA;&#xA;There were additional failures detected after the initial failure. These are visible in the timeline&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:148 @ 05/18/26 22:53:59.46&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t found for Component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t reason: Failed&#xA;an error happened during storing pipelineRun log gitlab-rep-gpei:test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t: container &#34;step-app-check&#34; in pod &#34;test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod&#34; is waiting to start: PodInitializing&#xA;failed to get logs for PipelineRun gitlab-rep-gpei:test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t: container &#34;step-app-check&#34; in pod &#34;test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod&#34; is waiting to start: PodInitializing&#xA;attempt 1/3: PipelineRun &#34;test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t&#34; failed: &#xA; pod: test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t-init-pod | init container: prepare&#xA;2026/05/18 22:54:30 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw-on-pull-request-k7l9t-init-pod | container step-init: &#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T22:54:43Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw03a99cb87112377b9e5853d9da4d7556-pod | init container: prepare&#xA;2026/05/18 22:57:47 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw03a99cb87112377b9e5853d9da4d7556-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-18T22:57:51Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-c4e252d81caa2ae3403654628e4ca6bfbabb0ebf&#34;&#xA;time=&#34;2026-05-18T22:57:51Z&#34; level=info msg=&#34;[param] digest: sha256:4159e58b1a8353fd4a9fdee3c2f3808ddd4007aaca29b3acc88ec082d540cde0&#34;&#xA;time=&#34;2026-05-18T22:57:51Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-18T22:57:52Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | init container: prepare&#xA;2026/05/18 22:57:47 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | init container: place-scripts&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-0-fzg2x&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-1-64mnd&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-2-5lh77&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-3-lrxsg&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-4-46mp4&#xA;2026/05/18 22:57:48 Decoded script /tekton/scripts/script-5-mrlmn&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | container step-introspect: &#xA;&#xA;pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | container step-generate-container-auth: &#xA;&#xA;pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | container step-set-skip-for-bundles: &#xA;&#xA;pod: test-comp-pac-gitlab-ektijwa9609a3ed55e9f571dc7cf486168504b-pod | container step-app-check: &#xA;New PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 found after retrigger for component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 found for Component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-dv774 reason: Failed&#xA;attempt 2/3: PipelineRun &#34;test-comp-pac-gitlab-ektijw-on-pull-request-dv774&#34; failed: &#xA; pod: test-comp-pac-gitlab-ektijw-on-pull-request-dv774-init-pod | init container: prepare&#xA;2026/05/18 22:59:40 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw-on-pull-request-dv774-init-pod | container step-init: &#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T22:59:42Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw147b765df06975a3aab862e3b3be68d8-pod | init container: prepare&#xA;2026/05/18 23:02:09 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw147b765df06975a3aab862e3b3be68d8-pod | init container: place-scripts&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-0-8ttqr&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-1-g8m9z&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw147b765df06975a3aab862e3b3be68d8-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 45.390 sec (0 m 45 s)&#xA;Start Date: 2026:05:18 23:02:33&#xA;End Date:   2026:05:18 23:03:18&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1779145398&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1779145398&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1779145398&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#34;, &#34;digests&#34;: [&#34;sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b&#34;]}}&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw147b765df06975a3aab862e3b3be68d8-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#xA;[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b@sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading d122c7c0ea53 clamscan-ec-test-amd64.json&#xA;Uploading d4a70ae774eb clamscan-result-amd64.log&#xA;Uploaded  d122c7c0ea53 clamscan-ec-test-amd64.json&#xA;Uploaded  d4a70ae774eb clamscan-result-amd64.log&#xA;Uploading 943a0830a965 application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  943a0830a965 application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b@sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b&#xA;Digest: sha256:943a0830a965cd53902b171df4b6c24be94486955b975cc033f3d3785a40054f&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw55c20452b61d84d748f2aa95c602f6e8-pod | init container: prepare&#xA;2026/05/18 23:02:11 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw55c20452b61d84d748f2aa95c602f6e8-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-18T23:02:13Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#34;&#xA;time=&#34;2026-05-18T23:02:13Z&#34; level=info msg=&#34;[param] digest: sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b&#34;&#xA;time=&#34;2026-05-18T23:02:13Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-18T23:02:14Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA; pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | init container: prepare&#xA;2026/05/18 23:02:10 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | init container: place-scripts&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-0-kqf2v&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-1-6p9tl&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-2-4rwsf&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-3-49g8w&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-4-fqhkv&#xA;2026/05/18 23:02:10 Decoded script /tekton/scripts/script-5-8m9k9&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-set-skip-for-bundles: &#xA;2026/05/18 23:02:48 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-app-check: &#xA;time=&#34;2026-05-18T23:02:49Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.18.0 &lt;commit: f87ac516cd4eaadf7b7e75926f300971c78afeb5&gt;&#34;&#xA;time=&#34;2026-05-18T23:02:49Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b for platform amd64&#34;&#xA;time=&#34;2026-05-18T23:02:49Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#34;&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-3894195657/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-18T23:02:57Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-18T23:03:05Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-18T23:03:06Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-18T23:03:06Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-b972b2347a25a904425b0356706a88376859e68b will be paired with digest sha256:ff5aa077e8fd0628419337bdfd948c16b7280e4533423e8da5fb48722cabe92b once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.18.0&#34;,&#xA;        &#34;commit&#34;: &#34;f87ac516cd4eaadf7b7e75926f300971c78afeb5&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 41,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 8464,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 510,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-05-18T23:03:06Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145386&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-b972b2347a25a904425b0356706a88376859e68b&#xA;&#xA;pod: test-comp-pac-gitlab-ektijwcf17bbf4988742deeabd2b5af1b531ac-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145386&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}New PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r found after retrigger for component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r found for Component gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: ResolvingTaskRef&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Running&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: PipelineRunStopping&#xA;PipelineRun test-comp-pac-gitlab-ektijw-on-pull-request-wc62r reason: Failed&#xA;attempt 3/3: PipelineRun &#34;test-comp-pac-gitlab-ektijw-on-pull-request-wc62r&#34; failed: &#xA; pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare&#xA;2026/05/18 23:03:53 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: &#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare&#xA;2026/05/18 23:05:49 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: &#xA;Starting clamd ...&#xA;clamd is ready!&#xA;Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.&#xA;Detected container image. Processing image manifests.&#xA;Running &#34;oc image extract&#34; on image of arch amd64&#xA;Scanning image for arch amd64. This operation may take a while.&#xA;&#xA;----------- SCAN SUMMARY -----------&#xA;Infected files: 0&#xA;Time: 51.628 sec (0 m 51 s)&#xA;Start Date: 2026:05:18 23:06:08&#xA;End Date:   2026:05:18 23:07:00&#xA;Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004&#xA;[&#xA;&#x9;{&#xA;&#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;&#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;&#x9;&#x9;&#34;successes&#34;: 2&#xA;&#x9;}&#xA;]&#xA;{&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;{&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;, &#34;digests&#34;: [&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;]}}&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: &#xA;Selecting auth&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;Preparing clamscan-result-amd64.log&#xA;Preparing clamscan-ec-test-amd64.json&#xA;Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;Uploading ad288f792f2a clamscan-result-amd64.log&#xA;Uploading 048f702127eb clamscan-ec-test-amd64.json&#xA;Uploaded  048f702127eb clamscan-ec-test-amd64.json&#xA;Uploaded  ad288f792f2a clamscan-result-amd64.log&#xA;Uploading f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;Uploaded  f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#xA;Digest: sha256:f4629fc5073c95c8c366a3ade61cc0e1855aaba8d916ac877d56633946515f27&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: prepare&#xA;2026/05/18 23:05:48 Entrypoint initialization&#xA;&#xA; pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: place-scripts&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-dm6qp&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-lz2f8&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-2-snbtz&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-3-qcjnr&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-4-r4bmz&#xA;2026/05/18 23:05:49 Decoded script /tekton/scripts/script-5-bsqzg&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-introspect: &#xA;Artifact type will be determined by introspection.&#xA;Checking the media type of the OCI artifact...&#xA;[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;Looking for image labels that indicate this might be an operator bundle...&#xA;[retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;Found 0 matching labels.&#xA;Expecting 3 or more to identify this image as an operator bundle.&#xA;Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-generate-container-auth: &#xA;Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;Auth json written to &#34;/auth/auth.json&#34;.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-set-skip-for-bundles: &#xA;2026/05/18 23:06:34 INFO Step was skipped due to when expressions were evaluated to false.&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-check: &#xA;time=&#34;2026-05-18T23:06:35Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.18.0 &lt;commit: f87ac516cd4eaadf7b7e75926f300971c78afeb5&gt;&#34;&#xA;time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a for platform amd64&#34;&#xA;time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2898642936/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a will be paired with digest sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;{&#xA;    &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;,&#xA;    &#34;passed&#34;: false,&#xA;    &#34;test_library&#34;: {&#xA;        &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;        &#34;version&#34;: &#34;1.18.0&#34;,&#xA;        &#34;commit&#34;: &#34;f87ac516cd4eaadf7b7e75926f300971c78afeb5&#34;&#xA;    },&#xA;    &#34;results&#34;: {&#xA;        &#34;passed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                &#34;elapsed_time&#34;: 52,&#xA;                &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                &#34;elapsed_time&#34;: 9096,&#xA;                &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;            },&#xA;            {&#xA;                &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                &#34;elapsed_time&#34;: 117,&#xA;                &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;            }&#xA;        ],&#xA;        &#34;failed&#34;: [&#xA;            {&#xA;                &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                &#34;elapsed_time&#34;: 0,&#xA;                &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;            }&#xA;        ],&#xA;        &#34;errors&#34;: []&#xA;    }&#xA;}&#xA;time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-set-outcome: &#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-final-outcome: &#xA;+ [[ ! -f /mount/konflux.results.json ]]&#xA;+ tee /tekton/steps/step-final-outcome/results/test-output&#xA;{&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA; pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | init container: prepare&#xA;2026/05/18 23:05:50 Entrypoint initialization&#xA;&#xA;pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | container step-apply-additional-tags: &#xA;time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] digest: sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;&#xA;time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;time=&#34;2026-05-18T23:05:54Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;{&#34;tags&#34;:[]}&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0020a27c0&gt;: &#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare&#xA;    2026/05/18 23:03:53 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: &#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;    time=&#34;2026-05-18T23:03:55Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare&#xA;    2026/05/18 23:05:49 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: &#xA;    Starting clamd ...&#xA;    clamd is ready!&#xA;    Detecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.&#xA;    Detected container image. Processing image manifests.&#xA;    Running &#34;oc image extract&#34; on image of arch amd64&#xA;    Scanning image for arch amd64. This operation may take a while.&#xA;    &#xA;    ----------- SCAN SUMMARY -----------&#xA;    Infected files: 0&#xA;    Time: 51.628 sec (0 m 51 s)&#xA;    Start Date: 2026:05:18 23:06:08&#xA;    End Date:   2026:05:18 23:07:00&#xA;    Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004&#xA;    [&#xA;    &#x9;{&#xA;    &#x9;&#x9;&#34;filename&#34;: &#34;/work/logs/clamscan-result-log-amd64.json&#34;,&#xA;    &#x9;&#x9;&#34;namespace&#34;: &#34;required_checks&#34;,&#xA;    &#x9;&#x9;&#34;successes&#34;: 2&#xA;    &#x9;}&#xA;    ]&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;timestamp&#34;:&#34;1779145620&#34;,&#34;namespace&#34;:&#34;required_checks&#34;,&#34;successes&#34;:2,&#34;failures&#34;:0,&#34;warnings&#34;:0,&#34;result&#34;:&#34;SUCCESS&#34;,&#34;note&#34;:&#34;All checks passed successfully&#34;}&#xA;    {&#34;image&#34;: {&#34;pullspec&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;, &#34;digests&#34;: [&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;]}}&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: &#xA;    Selecting auth&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    [retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json&#xA;    Preparing clamscan-result-amd64.log&#xA;    Preparing clamscan-ec-test-amd64.json&#xA;    Exists    44136fa355b3 application/vnd.oci.empty.v1+json&#xA;    Uploading ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading 048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  048f702127eb clamscan-ec-test-amd64.json&#xA;    Uploaded  ad288f792f2a clamscan-result-amd64.log&#xA;    Uploading f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Uploaded  f4629fc5073c application/vnd.oci.image.manifest.v1+json&#xA;    Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#xA;    Digest: sha256:f4629fc5073c95c8c366a3ade61cc0e1855aaba8d916ac877d56633946515f27&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: prepare&#xA;    2026/05/18 23:05:48 Entrypoint initialization&#xA;    &#xA;     pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | init container: place-scripts&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-dm6qp&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-lz2f8&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-2-snbtz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-3-qcjnr&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-4-r4bmz&#xA;    2026/05/18 23:05:49 Decoded script /tekton/scripts/script-5-bsqzg&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-introspect: &#xA;    Artifact type will be determined by introspection.&#xA;    Checking the media type of the OCI artifact...&#xA;    [retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json.&#xA;    Looking for image labels that indicate this might be an operator bundle...&#xA;    [retry] executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Found 0 matching labels.&#xA;    Expecting 3 or more to identify this image as an operator bundle.&#xA;    Introspection concludes that this artifact is of type &#34;application&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-generate-container-auth: &#xA;    Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    Using token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw&#xA;    Auth json written to &#34;/auth/auth.json&#34;.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-set-skip-for-bundles: &#xA;    2026/05/18 23:06:34 INFO Step was skipped due to when expressions were evaluated to false.&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-check: &#xA;    time=&#34;2026-05-18T23:06:35Z&#34; level=info msg=&#34;certification library version&#34; version=&#34;1.18.0 &lt;commit: f87ac516cd4eaadf7b7e75926f300971c78afeb5&gt;&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;running checks for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a for platform amd64&#34;&#xA;    time=&#34;2026-05-18T23:06:36Z&#34; level=info msg=&#34;target image&#34; image=&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;warning: licenses directory does not exist or all of its children are empty directories: error when checking for /licenses: stat /tmp/preflight-2898642936/fs/licenses: no such file or directory&#34; check=HasLicense&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasLicense result=FAILED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasUniqueTag result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=LayerCountAcceptable result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasNoProhibitedPackages result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=HasRequiredLabel result=PASSED&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;USER 185 specified that is non-root&#34; check=RunAsNonRoot&#xA;    time=&#34;2026-05-18T23:06:44Z&#34; level=info msg=&#34;check completed&#34; check=RunAsNonRoot result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=HasModifiedFiles result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;check completed&#34; check=BasedOnUbi result=PASSED&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;This image&#39;s tag on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a will be paired with digest sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit.&#34;&#xA;    {&#xA;        &#34;image&#34;: &#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;,&#xA;        &#34;passed&#34;: false,&#xA;        &#34;test_library&#34;: {&#xA;            &#34;name&#34;: &#34;github.com/redhat-openshift-ecosystem/openshift-preflight&#34;,&#xA;            &#34;version&#34;: &#34;1.18.0&#34;,&#xA;            &#34;commit&#34;: &#34;f87ac516cd4eaadf7b7e75926f300971c78afeb5&#34;&#xA;        },&#xA;        &#34;results&#34;: {&#xA;            &#34;passed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasUniqueTag&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has a tag other than &#39;latest&#39;, so that the image can be uniquely identified.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;LayerCountAcceptable&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container has less than 40 layers.  Too many layers within the container images can degrade container performance.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasNoProhibitedPackages&#34;,&#xA;                    &#34;elapsed_time&#34;: 52,&#xA;                    &#34;description&#34;: &#34;Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages.&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasRequiredLabel&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;RunAsNonRoot&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasModifiedFiles&#34;,&#xA;                    &#34;elapsed_time&#34;: 9096,&#xA;                    &#34;description&#34;: &#34;Checks that no files installed via RPM in the base Red Hat layer have been modified&#34;&#xA;                },&#xA;                {&#xA;                    &#34;name&#34;: &#34;BasedOnUbi&#34;,&#xA;                    &#34;elapsed_time&#34;: 117,&#xA;                    &#34;description&#34;: &#34;Checking if the container&#39;s base image is based upon the Red Hat Universal Base Image (UBI)&#34;&#xA;                }&#xA;            ],&#xA;            &#34;failed&#34;: [&#xA;                {&#xA;                    &#34;name&#34;: &#34;HasLicense&#34;,&#xA;                    &#34;elapsed_time&#34;: 0,&#xA;                    &#34;description&#34;: &#34;Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses&#34;,&#xA;                    &#34;help&#34;: &#34;Check HasLicense encountered an error. Please review the preflight.log file for more information.&#34;,&#xA;                    &#34;suggestion&#34;: &#34;Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.&#34;,&#xA;                    &#34;knowledgebase_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;,&#xA;                    &#34;check_url&#34;: &#34;https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction&#34;&#xA;                }&#xA;            ],&#xA;            &#34;errors&#34;: []&#xA;        }&#xA;    }&#xA;    time=&#34;2026-05-18T23:06:53Z&#34; level=info msg=&#34;Preflight result: FAILED&#34;&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-app-set-outcome: &#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}[retry] executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw51afee918c2dc445756b9adea9682282-pod | container step-final-outcome: &#xA;    + [[ ! -f /mount/konflux.results.json ]]&#xA;    + tee /tekton/steps/step-final-outcome/results/test-output&#xA;    {&#34;result&#34;:&#34;FAILURE&#34;,&#34;timestamp&#34;:&#34;1779145614&#34;,&#34;note&#34;:&#34;Task preflight is a FAILURE: Refer to Tekton task logs for more information&#34;,&#34;successes&#34;:7,&#34;failures&#34;:1,&#34;warnings&#34;:0}&#xA;     pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | init container: prepare&#xA;    2026/05/18 23:05:50 Entrypoint initialization&#xA;    &#xA;    pod: test-comp-pac-gitlab-ektijw678cc1c900677e0c3836dc06ea5eb3e6-pod | container step-apply-additional-tags: &#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] image-url: quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] digest: sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35&#34;&#xA;    time=&#34;2026-05-18T23:05:53Z&#34; level=info msg=&#34;[param] tags-from-image-label: konflux.additional-tags&#34;&#xA;    time=&#34;2026-05-18T23:05:54Z&#34; level=warning msg=&#34;No tags given in &#39;konflux.additional-tags&#39; image label&#34;&#xA;    {&#34;tags&#34;:[]}&#xA;    {&#xA;        s: &#34;\n pod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | init container: prepare\n2026/05/18 23:03:53 Entrypoint initialization\n\npod: test-comp-pac-gitlab-ektijw-on-pull-request-wc62r-init-pod | container step-init: \ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] enable: false\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] http-proxy-result-path: /tekton/results/http-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[param] no-proxy-result-path: /tekton/results/no-proxy\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Using in-cluster config\&#34; logger=KubeClient\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;Cache proxy is disabled via param\&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] HTTP PROXY: \&#34;\ntime=\&#34;2026-05-18T23:03:55Z\&#34; level=info msg=\&#34;[result] NO PROXY: \&#34;\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: prepare\n2026/05/18 23:05:49 Entrypoint initialization\n\n pod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | init container: place-scripts\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-0-nb9dj\n2026/05/18 23:05:49 Decoded script /tekton/scripts/script-1-x4nbm\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-extract-and-scan-image: \nStarting clamd ...\nclamd is ready!\nDetecting artifact type for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw@sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35.\nDetected container image. Processing image manifests.\nRunning \&#34;oc image extract\&#34; on image of arch amd64\nScanning image for arch amd64. This operation may take a while.\n\n----------- SCAN SUMMARY -----------\nInfected files: 0\nTime: 51.628 sec (0 m 51 s)\nStart Date: 2026:05:18 23:06:08\nEnd Date:   2026:05:18 23:07:00\nExecuted-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/28004/Mon May 18 06:24:38 2026 Database version: 28004\n[\n\t{\n\t\t\&#34;filename\&#34;: \&#34;/work/logs/clamscan-result-log-amd64.json\&#34;,\n\t\t\&#34;namespace\&#34;: \&#34;required_checks\&#34;,\n\t\t\&#34;successes\&#34;: 2\n\t}\n]\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;timestamp\&#34;:\&#34;1779145620\&#34;,\&#34;namespace\&#34;:\&#34;required_checks\&#34;,\&#34;successes\&#34;:2,\&#34;failures\&#34;:0,\&#34;warnings\&#34;:0,\&#34;result\&#34;:\&#34;SUCCESS\&#34;,\&#34;note\&#34;:\&#34;All checks passed successfully\&#34;}\n{\&#34;image\&#34;: {\&#34;pullspec\&#34;: \&#34;quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\&#34;, \&#34;digests\&#34;: [\&#34;sha256:72684aab6ebb78ee485b1c2bbf8389f6f0fccff3bcc984ccca517c732ac0cf35\&#34;]}}\n\npod: test-comp-pac-gitlab-ektijw0e925e8e55ccd8affbe112261fc33daf-pod | container step-upload: \nSelecting auth\nUsing token for quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw\nAttaching to quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a\n[retry] executing: oras attach --no-tty --registry-config /home/taskuser/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-gpei/test-comp-pac-gitlab-ektijw:on-pr-7f3583c98d05dcd319f01225c77538bac8ce377a@sha256:72684aab...&#xA;&#xA;Gomega truncated this representation as it exceeds &#39;format.MaxLength&#39;.&#xA;Consider having the object provide a custom &#39;GomegaStringer&#39; representation&#xA;or adjust the parameters in Gomega&#39;s &#39;format&#39; package.&#xA;&#xA;Learn more here: https://onsi.github.io/gomega/#adjusting-output&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:150 @ 05/18/26 23:07:10.523&#xA;&lt; Exit [It] should lead to build PipelineRun finishing successfully - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:148 @ 05/18/26 23:07:10.523 (13m11.064s)&#xA;&gt; Enter [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:94 @ 05/18/26 23:07:10.524&#xA;[FAILED] Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0020a3070&gt;: &#xA;    failed to get MR of IID 0 in projectID konflux-qe/hacbs-test-project-integration, 404 Not Found&#xA;    {&#xA;        s: &#34;failed to get MR of IID 0 in projectID konflux-qe/hacbs-test-project-integration, 404 Not Found&#34;,&#xA;    }&#xA;In [AfterAll] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:97 @ 05/18/26 23:07:10.811&#xA;&lt; Exit [AfterAll] Gitlab with status reporting of Integration tests in the assosiated merge request - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:94 @ 05/18/26 23:07:10.811 (287ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 23:07:10.811&#xA;&lt; Exit [AfterEach] [integration-service-suite Gitlab Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:42 @ 05/18/26 23:07:10.99 (179ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created should have a related PaC init MR is created [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:153 @ 05/18/26 23:07:10.991&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully for component  [integration-service, gitlab-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:172 @ 05/18/26 23:07:10.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:179 @ 05/18/26 23:07:10.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:183 @ 05/18/26 23:07:10.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:188 @ 05/18/26 23:07:10.992&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when the Snapshot was created should find the Integration Test Scenario PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:194 @ 05/18/26 23:07:10.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:207 @ 05/18/26 23:07:10.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:212 @ 05/18/26 23:07:10.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:229 @ 05/18/26 23:07:10.993&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:233 @ 05/18/26 23:07:10.994&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:250 @ 05/18/26 23:07:10.994&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created validates at least one MR note contains the final integration test result [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:254 @ 05/18/26 23:07:10.994&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created merging the PR should be successful [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:278 @ 05/18/26 23:07:10.994&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Integration PipelineRun is created leads to triggering on push PipelineRun [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:288 @ 05/18/26 23:07:10.994&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR should eventually complete successfully [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:303 @ 05/18/26 23:07:10.995&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it pass [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:308 @ 05/18/26 23:07:10.995&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Pass status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:325 @ 05/18/26 23:07:10.995&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR validates the Integration test scenario PipelineRun is reported to merge request CommitStatus, and it fails [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:329 @ 05/18/26 23:07:10.995&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Gitlab Status Reporting of Integration tests] Gitlab with status reporting of Integration tests in the assosiated merge request when Run integration tests after Merged MR eventually leads to the integration test PipelineRun&#39;s Fail status reported at MR commit status [integration-service, gitlab-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/gitlab-integration-reporting.go:346 @ 05/18/26 23:07:10.995&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if release CR is created [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies the advs release pipelinerun is running and succeeds [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-advisories pipeline] Rh-advisories happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, rhAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created does not contain an annotation with a Snapshot Name [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="941.787260215">
              <failure message="Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0003cabb0&gt;: &#xA;    no pipelinerun found for component test-component-pac-gznkkq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-component-pac-gznkkq&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0003cabb0&gt;: &#xA;    no pipelinerun found for component test-component-pac-gznkkq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-component-pac-gznkkq&#34;,&#xA;    }&#xA;In [BeforeAll] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:88 @ 05/18/26 23:09:00.36&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 05/18/26 22:53:19.562&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Build PipelineRun has not been created yet for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;[FAILED] Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the component stat-rep-mnov/test-component-pac-gznkkq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0003cabb0&gt;: &#xA;    no pipelinerun found for component test-component-pac-gznkkq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-component-pac-gznkkq&#34;,&#xA;    }&#xA;In [BeforeAll] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:88 @ 05/18/26 23:09:00.36&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:45 @ 05/18/26 23:09:00.36 (15m40.798s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:94 @ 05/18/26 23:09:00.36&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:94 @ 05/18/26 23:09:01.142 (781ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/18/26 23:09:01.142&#xA;&lt; Exit [AfterEach] [integration-service-suite Status Reporting of Integration tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:42 @ 05/18/26 23:09:01.35 (207ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should have a related PaC init PR created [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:115 @ 05/18/26 23:09:01.351&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created initialized integration test status is reported to github [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:134 @ 05/18/26 23:09:01.351&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when a new Component with specified custom branch is created should lead to build PipelineRun finishing successfully [integration-service, github-status-reporting, custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:144 @ 05/18/26 23:09:01.351&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:151 @ 05/18/26 23:09:01.351&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Snapshot is created [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:155 @ 05/18/26 23:09:01.352&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the PaC build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:160 @ 05/18/26 23:09:01.352&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when the Snapshot was created should find both the related Integration PipelineRuns [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:166 @ 05/18/26 23:09:01.352&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns are created should eventually complete successfully [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:190 @ 05/18/26 23:09:01.352&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully should lead to Snapshot CR being marked as failed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:199 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the successful Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:213 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:217 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:221 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:225 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the optional Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:229 @ 05/18/26 23:09:01.353&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the optional Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:244 @ 05/18/26 23:09:01.354&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the warning Integration Test Scenario status is reported in the Snapshot [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:248 @ 05/18/26 23:09:01.354&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully checks if the finalizer was removed from the warning Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:263 @ 05/18/26 23:09:01.354&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully merging the PR, expected to succeed  [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:267 @ 05/18/26 23:09:01.354&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully leads to triggering a push PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:276 @ 05/18/26 23:09:01.354&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully verifies that Push PipelineRuns completed [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:291 @ 05/18/26 23:09:01.355&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully validates the Integration test scenario PipelineRun is reported to merge request CheckRuns, and it pass [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:297 @ 05/18/26 23:09:01.355&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when Integration PipelineRuns completes successfully eventually leads to the status reported at Checks tab for the failed Integration PipelineRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:302 @ 05/18/26 23:09:01.355&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when The git-provider annotation is missing should set the git-reporting-failure annotation correctly [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:308 @ 05/18/26 23:09:01.355&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun is created but fails [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:355 @ 05/18/26 23:09:01.355&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Status Reporting of Integration tests] with status reporting of Integration tests in CheckRuns when build pipelinerun fails build pipelinerun failure is reported to integration test checkRun [integration-service, github-status-reporting]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/status-reporting-to-pullrequest.go:400 @ 05/18/26 23:09:01.356&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A creates the Component A successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="passed" time="44.130831801">
              <system-err>&gt; Enter [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:60 @ 05/18/26 22:53:19.558&#xA;Successfully acquired repository lock for namespace group-eepg&#xA;&lt; Exit [BeforeAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:60 @ 05/18/26 22:53:52.863 (33.305s)&#xA;&gt; Enter [It] creates the Component A successfully - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:205 @ 05/18/26 22:53:52.863&#xA;Image repository for component go-component-iqnajq in namespace group-eepg do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates the Component A successfully - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:205 @ 05/18/26 22:54:03.688 (10.825s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:50 @ 05/18/26 22:54:03.688&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:50 @ 05/18/26 22:54:03.688 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A triggers a Build PipelineRun for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="failed" time="901.898119151">
              <failure message="Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the componentA group-eepg/go-component-iqnajq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0007e6710&gt;: &#xA;    no pipelinerun found for component go-component-iqnajq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-iqnajq&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the componentA group-eepg/go-component-iqnajq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0007e6710&gt;: &#xA;    no pipelinerun found for component go-component-iqnajq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-iqnajq&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:224 @ 05/18/26 23:09:03.69&#xA;</failure>
              <system-err>&gt; Enter [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:213 @ 05/18/26 22:54:03.689&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;Build PipelineRun has not been created yet for the componentA group-eepg/go-component-iqnajq&#xA;[FAILED] Timed out after 900.000s.&#xA;timed out when waiting for the build PipelineRun to start for the componentA group-eepg/go-component-iqnajq&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0007e6710&gt;: &#xA;    no pipelinerun found for component go-component-iqnajq&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-iqnajq&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:224 @ 05/18/26 23:09:03.69&#xA;&lt; Exit [It] triggers a Build PipelineRun for componentA go-component - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:213 @ 05/18/26 23:09:03.69 (15m0.001s)&#xA;&gt; Enter [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:149 @ 05/18/26 23:09:03.69&#xA;&lt; Exit [AfterAll] with status reporting of Integration tests in CheckRuns - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:149 @ 05/18/26 23:09:05.348 (1.658s)&#xA;&gt; Enter [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:50 @ 05/18/26 23:09:05.348&#xA;&lt; Exit [AfterEach] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] - /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:50 @ 05/18/26 23:09:05.587 (239ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:227 @ 05/18/26 23:09:05.588&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to build PipelineRunA finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:231 @ 05/18/26 23:09:05.588&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component A should lead to a PaC PR creation for componentA go-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:236 @ 05/18/26 23:09:05.588&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:258 @ 05/18/26 23:09:05.588&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:263 @ 05/18/26 23:09:05.589&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLRA is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:270 @ 05/18/26 23:09:05.589&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:277 @ 05/18/26 23:09:05.589&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B creates the Component B successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:296 @ 05/18/26 23:09:05.589&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B triggers a Build PipelineRun for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:304 @ 05/18/26 23:09:05.59&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:318 @ 05/18/26 23:09:05.59&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:322 @ 05/18/26 23:09:05.59&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component B should lead to a PaC PR creation for component python-component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:327 @ 05/18/26 23:09:05.59&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:349 @ 05/18/26 23:09:05.59&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:354 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:361 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:368 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C creates the Component C successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:387 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C triggers a Build PipelineRun for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:395 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C does not contain an annotation with a Snapshot Name [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:409 @ 05/18/26 23:09:05.591&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to build PipelineRun finishing successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:413 @ 05/18/26 23:09:05.592&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when we start creation of a new Component C should lead to a PaC PR creation for componentC konflux-test-integration-clone [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:418 @ 05/18/26 23:09:05.592&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully checks if the Snapshot is created [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:440 @ 05/18/26 23:09:05.592&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully should find the related Integration PipelineRuns [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:445 @ 05/18/26 23:09:05.592&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Build PLR is finished successfully integration pipeline should end up with success [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:452 @ 05/18/26 23:09:05.592&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when the Snapshot testing is completed successfully should merge the init PaC PR successfully [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:459 @ 05/18/26 23:09:05.593&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the root folder [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:479 @ 05/18/26 23:09:05.593&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged should make change to the multiple-repo [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:497 @ 05/18/26 23:09:05.593&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for the last components build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:513 @ 05/18/26 23:09:05.593&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged wait for all component snapshots to be created with proper PR group annotations [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:521 @ 05/18/26 23:09:05.593&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged get all group snapshots and check if pr-group annotation contains all components [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:556 @ 05/18/26 23:09:05.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when both the init PaC PRs are merged make sure that group snapshot contains last build pipelinerun for each component [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:635 @ 05/18/26 23:09:05.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created make change to the multiple-repo to trigger a new cycle of testing [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:648 @ 05/18/26 23:09:05.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created wait for the components A and B build to finish [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:654 @ 05/18/26 23:09:05.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all component snapshots for component A and check if older snapshot has been cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:663 @ 05/18/26 23:09:05.594&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when Older snapshot and integration pipelinerun should be cancelled once new snapshot is created get all group snapshots and check if older group snapshot is cancelled [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:690 @ 05/18/26 23:09:05.595&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that ResolutionRequest is deleted after pipeline resolution [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:720 @ 05/18/26 23:09:05.595&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when ResolutionRequest is deleted after pipeline completes verifies that no orphaned ResolutionRequests remain in namespace after test completion [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:740 @ 05/18/26 23:09:05.595&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Creation of group snapshots for monorepo and multiple repos] with status reporting of Integration tests in CheckRuns when IntegrationTestScenario reference to task as pipelinerun resolution trigger pipelinerun for invalid integrationTestScenario by annotating snapshot and verify failing to create integration pipelinerun [integration-service, group-snapshot-creation]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/group-snapshots-tests.go:780 @ 05/18/26 23:09:05.595&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="failed" time="1238.653812879">
              <failure message="Unexpected error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;occurred" type="failed">[FAILED] Unexpected error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;occurred&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:87 @ 05/18/26 23:13:57.009&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:52 @ 05/18/26 22:53:19.357&#xA;Image repository for component test-component-pac-bklhvy in namespace integration1-zeqd do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] with happy path for general flow of Integration service - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:52 @ 05/18/26 22:53:56.995 (37.638s)&#xA;&gt; Enter [It] triggers a build PipelineRun - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:85 @ 05/18/26 22:53:56.995&#xA;no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)no pipelinerun found for component test-component-pac-bklhvy (application: integ-app-whjj, namespace: integration1-zeqd)&#xA;[FAILED] Unexpected error:&#xA;    &lt;context.deadlineExceededError&gt;: &#xA;    context deadline exceeded&#xA;    {}&#xA;occurred&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:87 @ 05/18/26 23:13:57.009&#xA;&lt; Exit [It] triggers a build PipelineRun - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:85 @ 05/18/26 23:13:57.009 (20m0.014s)&#xA;&gt; Enter [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:68 @ 05/18/26 23:13:57.009&#xA;&lt; Exit [AfterAll] with happy path for general flow of Integration service - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:68 @ 05/18/26 23:13:57.798 (789ms)&#xA;&gt; Enter [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:49 @ 05/18/26 23:13:57.799&#xA;&lt; Exit [AfterEach] [integration-service-suite Integration Service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:49 @ 05/18/26 23:13:58.01 (212ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created verifies if the build PipelineRun contains the finalizer [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:90 @ 05/18/26 23:13:58.011&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created waits for build PipelineRun to succeed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:101 @ 05/18/26 23:13:58.011&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when a new Component is created should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:107 @ 05/18/26 23:13:58.012&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:128 @ 05/18/26 23:13:58.012&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:132 @ 05/18/26 23:13:58.012&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:137 @ 05/18/26 23:13:58.012&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded verifies that the finalizer has been removed from the build pipelinerun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:141 @ 05/18/26 23:13:58.013&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if all of the integrationPipelineRuns passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:154 @ 05/18/26 23:13:58.013&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the passed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:158 @ 05/18/26 23:13:58.013&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:173 @ 05/18/26 23:13:58.013&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when the build pipelineRun run succeeded checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:183 @ 05/18/26 23:13:58.014&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates a ReleasePlan [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:188 @ 05/18/26 23:13:58.014&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:198 @ 05/18/26 23:13:58.014&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if the global candidate is updated after push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:205 @ 05/18/26 23:13:58.014&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if all of the integrationPipelineRuns created by push event passed [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:218 @ 05/18/26 23:13:58.014&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with happy path for general flow of Integration service when An snapshot of push event is created checks if a Release is created successfully [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:222 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail triggers a build PipelineRun [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:266 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail should have a related PaC init PR created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:273 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the BuildPipelineRun have the annotation of chains signed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:292 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Snapshot is created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:296 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the Build PipelineRun got annotated with Snapshot name [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:301 @ 05/18/26 23:13:58.015&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if all of the integrationPipelineRuns finished [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:305 @ 05/18/26 23:13:58.016&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the failed status of integration test is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:309 @ 05/18/26 23:13:58.016&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the skipped integration test is absent from the Snapshot&#39;s status annotation [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:324 @ 05/18/26 23:13:58.016&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if snapshot is marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:334 @ 05/18/26 23:13:58.016&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail checks if the finalizer was removed from all of the related Integration pipelineRuns [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:340 @ 05/18/26 23:13:58.016&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates a new IntegrationTestScenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:344 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail updates the Snapshot with the re-run label for the new scenario [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:349 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the new integration pipelineRun started [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:358 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the re-run label was removed from the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:364 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if all integration pipelineRuns finished successfully [integration-service, slow]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:378 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if the name of the re-triggered pipelinerun is reported in the Snapshot [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:382 @ 05/18/26 23:13:58.017&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot is updated with a re-run label for a given scenario checks if snapshot is still marked as failed [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:399 @ 05/18/26 23:13:58.018&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail creates an snapshot of push event [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:406 @ 05/18/26 23:13:58.018&#xA;</system-err>
          </testcase>
          <testcase name="[It] [integration-service-suite Integration Service E2E tests] with an integration test fail when An snapshot of push event is created checks no Release CRs are created [integration-service]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/integration-service/integration.go:413 @ 05/18/26 23:13:58.018&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification verifies that the ReleasePlan CR is unmatched in the beginning [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="74.798904338">
              <system-err>&gt; Enter [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:32 @ 05/18/26 22:53:19.356&#xA;&lt; Exit [BeforeAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:32 @ 05/18/26 22:54:33.804 (1m14.448s)&#xA;&gt; Enter [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:57 @ 05/18/26 22:54:33.805&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is unmatched in the beginning - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:57 @ 05/18/26 22:54:34.155 (350ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.155&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.155 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates ReleasePlanAdmission CR in corresponding managed namespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.405389982">
              <system-err>&gt; Enter [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:72 @ 05/18/26 22:54:34.155&#xA;&lt; Exit [It] Creates ReleasePlanAdmission CR in corresponding managed namespace - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:72 @ 05/18/26 22:54:34.561 (405ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.561&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.561 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.224661958">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:85 @ 05/18/26 22:54:34.561&#xA;&lt; Exit [It] verifies that the ReleasePlan CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:85 @ 05/18/26 22:54:34.786 (224ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.786&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.786 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is created in managed namespace verifies that the ReleasePlanAdmission CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.114278687">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:105 @ 05/18/26 22:54:34.786&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:105 @ 05/18/26 22:54:34.9 (114ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.9&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:34.9 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification Creates a manual release ReleasePlan CR in devNamespace [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.293646694">
              <system-err>&gt; Enter [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:123 @ 05/18/26 22:54:34.901&#xA;&lt; Exit [It] Creates a manual release ReleasePlan CR in devNamespace - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:123 @ 05/18/26 22:54:35.194 (293ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.194&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.194 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the second ReleasePlan CR is set to matched [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.09085899">
              <system-err>&gt; Enter [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:129 @ 05/18/26 22:54:35.195&#xA;&lt; Exit [It] verifies that the second ReleasePlan CR is set to matched - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:129 @ 05/18/26 22:54:35.285 (91ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.286&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.286 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when the second ReleasePlan CR is created verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.111422059">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:150 @ 05/18/26 22:54:35.286&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has two matched ReleasePlan CRs - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:150 @ 05/18/26 22:54:35.397 (111ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.397&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.397 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes one ReleasePlan CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.126592772">
              <system-err>&gt; Enter [It] deletes one ReleasePlan CR - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:171 @ 05/18/26 22:54:35.398&#xA;&lt; Exit [It] deletes one ReleasePlan CR - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:171 @ 05/18/26 22:54:35.524 (126ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.524&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.524 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when One ReleasePlan CR is deleted in managed namespace verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.265150479">
              <system-err>&gt; Enter [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:177 @ 05/18/26 22:54:35.525&#xA;&lt; Exit [It] verifies that the ReleasePlanAdmission CR has only one matching ReleasePlan - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:177 @ 05/18/26 22:54:35.79 (265ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.79&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.79 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification deletes the ReleasePlanAdmission CR [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="0.082002479">
              <system-err>&gt; Enter [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:198 @ 05/18/26 22:54:35.791&#xA;&lt; Exit [It] deletes the ReleasePlanAdmission CR - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:198 @ 05/18/26 22:54:35.872 (82ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.872&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:35.872 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-service-suite ReleasePlan and ReleasePlanAdmission match] RP and PRA status change verification when ReleasePlanAdmission CR is deleted in managed namespace verifies that the ReleasePlan CR has no matched ReleasePlanAdmission [release-service, release_plan_and_admission]" classname="Red Hat App Studio E2E tests" status="passed" time="32.610453783">
              <system-err>&gt; Enter [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:204 @ 05/18/26 22:54:35.873&#xA;&lt; Exit [It] verifies that the ReleasePlan CR has no matched ReleasePlanAdmission - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:204 @ 05/18/26 22:54:36.104 (231ms)&#xA;&gt; Enter [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:36.105&#xA;&lt; Exit [AfterEach] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:30 @ 05/18/26 22:54:36.105 (0s)&#xA;&gt; Enter [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:48 @ 05/18/26 22:54:36.105&#xA;&lt; Exit [AfterAll] [release-service-suite ReleasePlan and ReleasePlanAdmission match] - /tmp/tmp.5k64aXXzs4/tests/release/service/release_plan_and_admission_matched.go:48 @ 05/18/26 22:55:08.483 (32.378s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-djqf [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="failed" time="1309.752523606">
              <failure message="Timed out after 1200.001s.&#xA;timed out when waiting for the PipelineRun to start for the Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0017282e0&gt;: &#xA;    no pipelinerun found for component test-symlink-comp-djqf&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-symlink-comp-djqf&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for the PipelineRun to start for the Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0017282e0&gt;: &#xA;    no pipelinerun found for component test-symlink-comp-djqf&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-symlink-comp-djqf&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:200 @ 05/18/26 23:15:58.053&#xA;&#xA;There were additional failures detected after the initial failure. These are visible in the timeline&#xA;</failure>
              <system-err>&gt; Enter [BeforeAll] HACBS pipelines - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:237 @ 05/18/26 22:55:08.484&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1779144910-ptyx -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Image repository for component test-comp-yrsr in namespace build-e2e-nhkf do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-yrsr, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-ehrvoq, pacBranchName: konflux-test-comp-yrsr&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1779144923-nqcy -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-uafb, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-nvpjnk, pacBranchName: konflux-test-comp-uafb&#xA;&#34;level&#34;=0 &#34;msg&#34;=&#34;found credentials for image ref quay.io/redhat-appstudio-qe/test-images:pipeline-bundle-1779144935-cvbx -&gt; user: redhat-appstudio-qe+redhat_appstudio_quality&#34;&#xA;Created component for scenario sample-python-basic-oci: component: test-comp-dwyn, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-twldsz, pacBranchName: konflux-test-comp-dwyn&#xA;Created component for scenario sample-python-basic-oci: component: test-symlink-comp-djqf, repo: https://github.com/redhat-appstudio-qe/devfile-sample-python-basic, baseBranchName: base-zfmlcc, pacBranchName: konflux-test-symlink-comp-djqf&#xA;&lt; Exit [BeforeAll] HACBS pipelines - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:237 @ 05/18/26 22:55:58.051 (49.567s)&#xA;&gt; Enter [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-djqf - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:325 @ 05/18/26 22:55:58.052&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;PipelineRun has not been created yet for Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for the PipelineRun to start for the Component build-e2e-nhkf/test-symlink-comp-djqf&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0017282e0&gt;: &#xA;    no pipelinerun found for component test-symlink-comp-djqf&#xA;    {&#xA;        s: &#34;no pipelinerun found for component test-symlink-comp-djqf&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:200 @ 05/18/26 23:15:58.053&#xA;&lt; Exit [It] triggers PipelineRun for symlink component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-djqf - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:325 @ 05/18/26 23:15:58.053 (20m0.002s)&#xA;&gt; Enter [AfterAll] HACBS pipelines - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:271 @ 05/18/26 23:15:58.053&#xA;error while getting pipelineruns: no pipelinerun found for application test-app-jvpeerror while getting pipelineruns: no pipelinerun found for application test-app-jvpeerror while getting pipelineruns: no pipelinerun found for application test-app-jvpeerror while getting pipelineruns: no pipelinerun found for application test-app-jvpeerror while getting pipelineruns: no pipelinerun found for application test-app-jvpeerror while getting pipelineruns: no pipelinerun found for application test-app-jvpe&#xA;[FAILED] Timed out after 60.001s.&#xA;timed out when trying to remove the e2e-test finalizer from pipelineruns&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc0018c6db0&gt;: &#xA;    no pipelinerun found for application test-app-jvpe&#xA;    {&#xA;        s: &#34;no pipelinerun found for application test-app-jvpe&#34;,&#xA;    }&#xA;In [AfterAll] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:289 @ 05/18/26 23:16:58.054&#xA;&lt; Exit [AfterAll] HACBS pipelines - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:271 @ 05/18/26 23:16:58.054 (1m0.001s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:207 @ 05/18/26 23:16:58.055&#xA;&lt; Exit [AfterEach] [build-service-suite Build templates E2E test] - /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:207 @ 05/18/26 23:16:58.236 (182ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:338 @ 05/18/26 23:16:58.238&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:338 @ 05/18/26 23:16:58.238&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci triggers PipelineRun for component with source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:338 @ 05/18/26 23:16:58.238&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:356 @ 05/18/26 23:16:58.238&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:366 @ 05/18/26 23:16:58.238&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:378 @ 05/18/26 23:16:58.239&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:395 @ 05/18/26 23:16:58.239&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:420 @ 05/18/26 23:16:58.239&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:498 @ 05/18/26 23:16:58.239&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:540 @ 05/18/26 23:16:58.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:567 @ 05/18/26 23:16:58.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:659 @ 05/18/26 23:16:58.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:741 @ 05/18/26 23:16:58.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:356 @ 05/18/26 23:16:58.24&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:366 @ 05/18/26 23:16:58.241&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:378 @ 05/18/26 23:16:58.241&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:395 @ 05/18/26 23:16:58.241&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:420 @ 05/18/26 23:16:58.241&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:498 @ 05/18/26 23:16:58.241&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:540 @ 05/18/26 23:16:58.242&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:567 @ 05/18/26 23:16:58.242&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:659 @ 05/18/26 23:16:58.242&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:741 @ 05/18/26 23:16:58.242&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should eventually finish successfully for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:356 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should push Dockerfile to registry [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:366 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) floating tags are created successfully [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:378 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) image manifest mediaType is correct [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:395 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) check for source images if enabled in pipeline [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:420 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Records [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:498 @ 05/18/26 23:16:58.243&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when Pipeline Results are stored for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min should have Pipeline Logs [build, build-templates, HACBS, pipeline-service, pipeline]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) should validate tekton taskrun test results for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic and Pipeline docker-build-oci-ta-min [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:540 @ 05/18/26 23:16:58.244&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry verify-enterprise-contract check should pass [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:567 @ 05/18/26 23:16:58.244&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) when the container image for component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic is created and pushed to container registry should have Hermeto content in the SBOM in case the build was hermetic [build, build-templates, HACBS, pipeline-service, pipeline, sbom, slow, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:659 @ 05/18/26 23:16:58.244&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines scenario sample-python-basic-oci (docker-build-oci-ta-min) build-definitions ec pipelines runs ec pipeline pipelines/enterprise-contract.yaml [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:741 @ 05/18/26 23:16:58.244&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build templates E2E test] HACBS pipelines pipelineRun should fail for symlink component with Git source URL https://github.com/redhat-appstudio-qe/devfile-sample-python-basic with component name test-symlink-comp-djqf [build, build-templates, HACBS, pipeline-service, pipeline, build-templates-e2e, source-build-e2e]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/build_templates.go:813 @ 05/18/26 23:16:58.245&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHappyPath]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC Staged Index Post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcStagedIndex]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC hotfix process FBC hotfix post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcHotfix]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification creates component from git source https://github.com/redhat-appstudio-qe/fbc-sample-repo-test [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification Creates a push snapshot for a release [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies the fbc release pipelinerun is running and succeeds [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite FBC e2e-tests] with FBC pre-GA process FBC pre-GA post-release verification verifies release CR completed and set succeeded. [release-pipelines, fbc-release, fbcPreGA]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the release CR is created [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies the rhio release pipelinerun is running and succeeds [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for rh-push-to-redhat-io pipeline] Rh-push-to-redhat-io happy path Post-release verification verifies if the MR URL is valid [release-pipelines, rh-push-to-registry-redhat-io, PushToRedhatIO]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the release CR is created [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies the multiarch release pipelinerun is running and succeeds [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for multi arch with rh-advisories pipeline] Multi arch test happy path Post-release verification verifies if the repository URL is valid [release-pipelines, rh-advisories, multiarch-advisories, multiArchAdvisories]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="111.844059266">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:53:19.562&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:54:15.265 (55.703s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:54:15.265&#xA;Image repository for component gl-test-custom-default-wxlrxt in namespace build-e2e-wvsz do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:54:35.32 (20.055s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:54:35.32&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:55:11.406 (36.086s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:11.406&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:11.406 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.016717248">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:55:11.407&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:55:11.423 (16ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:11.423&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:11.423 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.030623526">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 22:55:11.424&#xA;PipelineRun has not been created yet for the component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 22:55:31.454 (20.03s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.454&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.454 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000314748">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:191 @ 05/18/26 22:55:31.455&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:191 @ 05/18/26 22:55:31.455 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.455&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.455 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.007802131">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:195 @ 05/18/26 22:55:31.455&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://gitlab.com/konflux-qe/devfile-sample-hello-world-pfekph/-/merge_requests/1&#34;,&#34;configuration-time&#34;:&#34;Mon, 18 May 2026 22:55:07 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://gitlab.com/konflux-qe/devfile-sample-hello-world-pfekph/-/merge_requests/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Mon, 18 May 2026 22:55:07 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:195 @ 05/18/26 22:55:31.463 (7ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.463&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:31.463 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.850854365">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:225 @ 05/18/26 22:55:31.463&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:225 @ 05/18/26 22:55:32.314 (850ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:32.314&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:32.314 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.27616387">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:243 @ 05/18/26 22:55:32.315&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:243 @ 05/18/26 22:55:32.59 (276ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:32.591&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:32.591 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="12.046628524">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:249 @ 05/18/26 22:55:32.591&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:249 @ 05/18/26 22:55:44.637 (12.046s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:44.638&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:44.638 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.187707407">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:265 @ 05/18/26 22:55:44.638&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:265 @ 05/18/26 22:55:44.825 (187ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:44.826&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:44.826 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.862244268">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:278 @ 05/18/26 22:55:44.827&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:278 @ 05/18/26 22:55:45.688 (862ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:45.689&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:45.689 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="50.085688567">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:306 @ 05/18/26 22:55:45.689&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:306 @ 05/18/26 22:55:55.731 (10.041s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:332 @ 05/18/26 22:55:55.731&#xA;PipelineRun has not been created yet for the component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun has not been created yet for the component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:332 @ 05/18/26 22:56:35.775 (40.044s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:35.775&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:35.775 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.233420822">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:347 @ 05/18/26 22:56:35.775&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:347 @ 05/18/26 22:56:36.008 (233ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:36.009&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:36.009 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="470.889609764">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:365 @ 05/18/26 22:56:36.009&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-5z2pg found for Component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-5z2pg reason: ResolvingTaskRef&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-5z2pg reason: Cancelled&#xA;attempt 1/3: PipelineRun &#34;gl-test-custom-branch-tfxqns-on-pull-request-5z2pg&#34; failed: Cancelled: PipelineRun &#34;gl-test-custom-branch-tfxqns-on-pull-request-5z2pg&#34; was cancelledNew PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq found after retrigger for component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq found for Component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-b2jvq reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:365 @ 05/18/26 23:04:26.898 (7m50.889s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:26.898&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:26.899 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.875944607">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:371 @ 05/18/26 23:04:26.899&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:371 @ 05/18/26 23:04:27.775 (875ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:27.775&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:27.775 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.273163122">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:390 @ 05/18/26 23:04:27.776&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:390 @ 05/18/26 23:04:28.049 (273ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.049&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.049 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.366353899">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:396 @ 05/18/26 23:04:28.05&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-wvsz/gl-test-custom-branch-tfxqns:on-pr-f9ea25dadc335da87f9c74323810e9eab020075a successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:396 @ 05/18/26 23:04:28.416 (366ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.416&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.416 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.332018698">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:425 @ 05/18/26 23:04:28.417&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:425 @ 05/18/26 23:04:28.748 (332ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.749&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:28.749 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.458248742">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:439 @ 05/18/26 23:04:28.749&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:439 @ 05/18/26 23:04:29.024 (275ms)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:324 @ 05/18/26 23:04:29.025&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:324 @ 05/18/26 23:04:29.207 (182ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:29.207&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:29.207 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.203375703">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:454 @ 05/18/26 23:04:29.208&#xA;created file sha: 339dcff54d460868f832b4aa186c656cf01e2646&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:454 @ 05/18/26 23:04:30.381 (1.173s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:464 @ 05/18/26 23:04:30.381&#xA;PipelineRun has not been created yet for the component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:464 @ 05/18/26 23:04:50.411 (20.03s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:50.411&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:50.411 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.250015743">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:479 @ 05/18/26 23:04:50.412&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:479 @ 05/18/26 23:04:50.661 (250ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:50.662&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:04:50.662 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="320.016939631">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:498 @ 05/18/26 23:04:50.662&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 found for Component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-pull-request-s79l2 reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:498 @ 05/18/26 23:10:10.679 (5m20.017s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:10.679&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:10.679 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.30092395">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:504 @ 05/18/26 23:10:10.68&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:504 @ 05/18/26 23:10:10.98 (301ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:10.98&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:10.98 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.487773183">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:520 @ 05/18/26 23:10:10.981&#xA;merged result sha: 444f352243ce3b68548fd10e4ffa44633bf795e8&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:520 @ 05/18/26 23:10:12.443 (1.462s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:530 @ 05/18/26 23:10:12.443&#xA;PipelineRun has not been created yet for the component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:530 @ 05/18/26 23:10:32.468 (20.025s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:32.468&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:10:32.469 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="260.020349057">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:546 @ 05/18/26 23:10:32.469&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm found for Component build-e2e-wvsz/gl-test-custom-branch-tfxqns&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Running&#xA;PipelineRun gl-test-custom-branch-tfxqns-on-push-th2xm reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:546 @ 05/18/26 23:14:52.489 (4m20.02s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:14:52.489&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:14:52.489 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.276134811">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:552 @ 05/18/26 23:14:52.49&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:552 @ 05/18/26 23:14:52.766 (276ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:14:52.766&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:14:52.766 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="122.510689449">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:564 @ 05/18/26 23:14:52.767&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:564 @ 05/18/26 23:16:55.277 (2m2.51s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:16:55.277&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:16:55.277 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.346904114">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:595 @ 05/18/26 23:16:55.278&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:595 @ 05/18/26 23:16:55.625 (346ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:16:55.625&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:16:55.625 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.223531927">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:649 @ 05/18/26 23:16:55.626&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:649 @ 05/18/26 23:16:56.66 (1.034s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:661 @ 05/18/26 23:16:56.66&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:661 @ 05/18/26 23:17:02.849 (6.189s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:17:02.85&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:17:02.85 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, gitlab, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="2.386728342">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:679 @ 05/18/26 23:17:02.85&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:679 @ 05/18/26 23:17:03.149 (298ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:17:03.149&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:17:05.236 (2.088s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:17:05.237&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:17:05.237 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR is created for the Snapshot [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification verifies a release PipelineRun is started and succeeded in managed namespace [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validate the result of task create-pyxis-image contains image ids [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification tests that Release CR has completed [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite [HACBS-1571]test-release-e2e-push-image-to-pyxis] Post-release verification validates that imageIds from task create-pyxis-image exist in Pyxis. [release-pipelines, rh-push-to-external-registry]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory go-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="passed" time="68.996980786">
              <system-err>&gt; Enter [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:40 @ 05/18/26 22:53:19.563&#xA;&lt; Exit [BeforeAll] test pac with multiple components using same repository - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:40 @ 05/18/26 22:54:08.37 (48.807s)&#xA;&gt; Enter [It] creates component with context directory go-component - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:106 @ 05/18/26 22:54:08.371&#xA;Image repository for component go-component-pinjin in namespace build-e2e-uvfl do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component go-component-pinjin in namespace build-e2e-uvfl do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with context directory go-component - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:106 @ 05/18/26 22:54:28.559 (20.189s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:28 @ 05/18/26 22:54:28.56&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:28 @ 05/18/26 22:54:28.56 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component go-component-pinjin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="failed" time="1801.320761064">
              <failure message="Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component go-component-pinjin/build-e2e-uvfl&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000f00380&gt;: &#xA;    no pipelinerun found for component go-component-pinjin&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-pinjin&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component go-component-pinjin/build-e2e-uvfl&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000f00380&gt;: &#xA;    no pipelinerun found for component go-component-pinjin&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-pinjin&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:137 @ 05/18/26 23:24:28.561&#xA;</failure>
              <system-err>&gt; Enter [It] triggers a PipelineRun for component go-component-pinjin - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:125 @ 05/18/26 22:54:28.56&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;PipelineRun has not been created yet for the component build-e2e-uvfl/go-component-pinjin&#xA;[FAILED] Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component go-component-pinjin/build-e2e-uvfl&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc000f00380&gt;: &#xA;    no pipelinerun found for component go-component-pinjin&#xA;    {&#xA;        s: &#34;no pipelinerun found for component go-component-pinjin&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:137 @ 05/18/26 23:24:28.561&#xA;&lt; Exit [It] triggers a PipelineRun for component go-component-pinjin - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:125 @ 05/18/26 23:24:28.561 (30m0.001s)&#xA;&gt; Enter [AfterAll] test pac with multiple components using same repository - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:68 @ 05/18/26 23:24:28.561&#xA;&lt; Exit [AfterAll] test pac with multiple components using same repository - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:68 @ 05/18/26 23:24:29.643 (1.082s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:28 @ 05/18/26 23:24:29.643&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:28 @ 05/18/26 23:24:29.881 (238ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component go-component-pinjin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:140 @ 05/18/26 23:24:29.882&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component go-component-pinjin [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:159 @ 05/18/26 23:24:29.882&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:164 @ 05/18/26 23:24:29.882&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:174 @ 05/18/26 23:24:29.883&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace creates component with context directory python-component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:106 @ 05/18/26 23:24:29.883&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace triggers a PipelineRun for component python-component-bkycno [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:125 @ 05/18/26 23:24:29.883&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace should lead to a PaC PR creation for component python-component-bkycno [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:140 @ 05/18/26 23:24:29.883&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace the PipelineRun should eventually finish successfully for component python-component-bkycno [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:159 @ 05/18/26 23:24:29.883&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace merging the PR should be successful [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:164 @ 05/18/26 23:24:29.884&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace leads to triggering on push PipelineRun [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:174 @ 05/18/26 23:24:29.884&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only one component is changed [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:190 @ 05/18/26 23:24:29.884&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when components are created in same namespace only related pipelinerun should be triggered [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:205 @ 05/18/26 23:24:29.884&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test pac with multiple components using same repository when a components is created with same git url in different namespace should fail to configure PaC for the component [build-service, github, pac-build, multi-component]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/multi_component.go:264 @ 05/18/26 23:24:29.885&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="passed" time="85.585685227">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:53:19.457&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gh-multi-component-parent-guwh&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:54:24.752 (1m5.295s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:54:24.752&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:54:45.042 (20.29s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:54:45.042&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:54:45.042 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="failed" time="1818.288653999">
              <failure message="Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-multi-component-parent-guwh/build-e2e-eaam&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc00111c180&gt;: &#xA;    no pipelinerun found for component gh-multi-component-parent-guwh&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-multi-component-parent-guwh&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-multi-component-parent-guwh/build-e2e-eaam&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc00111c180&gt;: &#xA;    no pipelinerun found for component gh-multi-component-parent-guwh&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-multi-component-parent-guwh&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:272 @ 05/18/26 23:24:45.043&#xA;</failure>
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 22:54:45.043&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;PipelineRun has not been created yet for the component build-e2e-eaam/gh-multi-component-parent-guwh&#xA;[FAILED] Timed out after 1800.000s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-multi-component-parent-guwh/build-e2e-eaam&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc00111c180&gt;: &#xA;    no pipelinerun found for component gh-multi-component-parent-guwh&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-multi-component-parent-guwh&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:272 @ 05/18/26 23:24:45.043&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 23:24:45.043 (30m0s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:24:45.043&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:25:03.092 (18.049s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:25:03.092&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:25:03.331 (239ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:274 @ 05/18/26 23:25:03.332&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:285 @ 05/18/26 23:25:03.333&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:289 @ 05/18/26 23:25:03.333&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:307 @ 05/18/26 23:25:03.333&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:318 @ 05/18/26 23:25:03.333&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:358 @ 05/18/26 23:25:03.334&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:375 @ 05/18/26 23:25:03.334&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:385 @ 05/18/26 23:25:03.334&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:401 @ 05/18/26 23:25:03.334&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:412 @ 05/18/26 23:25:03.334&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:429 @ 05/18/26 23:25:03.335&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, github]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:440 @ 05/18/26 23:25:03.335&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="106.555141258">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:53:19.562&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:54:09.477 (49.915s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:54:09.477&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:54:19.943 (10.466s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:54:19.943&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:55:06.116 (46.173s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:06.116&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:06.116 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.0155017">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:55:06.117&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:55:06.132 (15ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:06.132&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:06.132 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="failed" time="1800.245881782">
              <failure message="Timed out after 1800.001s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-test-custom-branch-rghugi/build-e2e-hxgw&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001430c10&gt;: &#xA;    no pipelinerun found for component gh-test-custom-default-egotzb&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-test-custom-default-egotzb&#34;,&#xA;    }" type="failed">[FAILED] Timed out after 1800.001s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-test-custom-branch-rghugi/build-e2e-hxgw&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001430c10&gt;: &#xA;    no pipelinerun found for component gh-test-custom-default-egotzb&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-test-custom-default-egotzb&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:188 @ 05/18/26 23:25:06.134&#xA;</failure>
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 22:55:06.133&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;PipelineRun has not been created yet for the component build-e2e-hxgw/gh-test-custom-branch-rghugi&#xA;[FAILED] Timed out after 1800.001s.&#xA;timed out when waiting for the PipelineRun to start for the component gh-test-custom-branch-rghugi/build-e2e-hxgw&#xA;Expected success, but got an error:&#xA;    &lt;*errors.errorString | 0xc001430c10&gt;: &#xA;    no pipelinerun found for component gh-test-custom-default-egotzb&#xA;    {&#xA;        s: &#34;no pipelinerun found for component gh-test-custom-default-egotzb&#34;,&#xA;    }&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:188 @ 05/18/26 23:25:06.134&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 23:25:06.134 (30m0.001s)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:25:06.134&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:25:06.134 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:25:06.134&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:25:06.378 (244ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:191 @ 05/18/26 23:25:06.379&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:195 @ 05/18/26 23:25:06.379&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:225 @ 05/18/26 23:25:06.38&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:243 @ 05/18/26 23:25:06.38&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:249 @ 05/18/26 23:25:06.38&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:265 @ 05/18/26 23:25:06.38&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, github, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:278 @ 05/18/26 23:25:06.381&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:332 @ 05/18/26 23:25:06.381&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:347 @ 05/18/26 23:25:06.381&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:365 @ 05/18/26 23:25:06.381&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:371 @ 05/18/26 23:25:06.381&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:390 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:396 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:425 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:439 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:464 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:479 @ 05/18/26 23:25:06.382&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:498 @ 05/18/26 23:25:06.383&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:504 @ 05/18/26 23:25:06.383&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:530 @ 05/18/26 23:25:06.383&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:546 @ 05/18/26 23:25:06.383&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:552 @ 05/18/26 23:25:06.383&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:564 @ 05/18/26 23:25:06.384&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:595 @ 05/18/26 23:25:06.384&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:661 @ 05/18/26 23:25:06.385&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gh PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, github, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:679 @ 05/18/26 23:25:06.385&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="102.117635958">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:53:19.458&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;gl-multi-component-parent-skrg&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:54:41.417 (1m21.959s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:54:41.417&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:55:01.575 (20.158s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:55:01.575&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:55:01.575 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="60.090864081">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 22:55:01.576&#xA;PipelineRun has not been created yet for the component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun has not been created yet for the component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun has not been created yet for the component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 22:56:01.666 (1m0.091s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:56:01.666&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:56:01.666 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="682.278988935">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:274 @ 05/18/26 22:56:01.667&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-gtdj4 found for Component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-gtdj4 reason: ResolvingTaskRef&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-gtdj4 reason: Cancelled&#xA;an error happened during storing pipelineRun log build-e2e-lslq:gl-multi-component-parent-skrg-on-pull-request-gtdj4: container &#34;step-init&#34; in pod &#34;gl-multi-component-parent-skrg-on-pull-request-qftrf-init-pod&#34; is waiting to start: PodInitializing&#xA;failed to get logs for PipelineRun build-e2e-lslq:gl-multi-component-parent-skrg-on-pull-request-gtdj4: container &#34;step-init&#34; in pod &#34;gl-multi-component-parent-skrg-on-pull-request-qftrf-init-pod&#34; is waiting to start: PodInitializing&#xA;attempt 1/3: PipelineRun &#34;gl-multi-component-parent-skrg-on-pull-request-gtdj4&#34; failed: &#xA; pod: gl-multi-component-parent-skrg-on-pull-request-qftrf-init-pod | init container: prepare&#xA;2026/05/18 22:56:07 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-skrg-on-pull-request-qftrf-init-pod | container step-init: &#xA;New PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 found after retrigger for component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 found for Component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: PipelineRunStopping&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-5b6j5 reason: Failed&#xA;attempt 2/3: PipelineRun &#34;gl-multi-component-parent-skrg-on-pull-request-5b6j5&#34; failed: &#xA; pod: gl-multi-component-parent-skrg-on-pull-request-5b6j5-init-pod | init container: prepare&#xA;2026/05/18 22:56:32 Entrypoint initialization&#xA;&#xA;pod: gl-multi-component-parent-skrg-on-pull-request-5b6j5-init-pod | container step-init: &#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T22:56:35Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml found after retrigger for component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml found for Component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-pull-request-mg8ml reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:274 @ 05/18/26 23:07:23.946 (11m22.279s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:23.946&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:23.946 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.039445199">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:285 @ 05/18/26 23:07:23.947&#xA;PipelineRun gl-multi-component-child-skrg-on-pull-request-kmcds found for Component build-e2e-lslq/gl-multi-component-child-skrg&#xA;PipelineRun gl-multi-component-child-skrg-on-pull-request-kmcds reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:285 @ 05/18/26 23:07:23.986 (39ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:23.986&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:23.986 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.33488908">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:289 @ 05/18/26 23:07:23.987&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:289 @ 05/18/26 23:07:24.321 (335ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:24.321&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:24.321 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.460015745">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:307 @ 05/18/26 23:07:24.322&#xA;merged result sha: b856b71a62b31a2225974e8d6fb20afa25f62ab0 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:307 @ 05/18/26 23:07:25.781 (1.46s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:25.782&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:07:25.782 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="65.110695542">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:318 @ 05/18/26 23:07:25.782&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:318 @ 05/18/26 23:08:30.893 (1m5.11s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:30.893&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:30.893 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="0.239063051">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:358 @ 05/18/26 23:08:30.894&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:358 @ 05/18/26 23:08:31.132 (239ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:31.132&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:31.132 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="1.3559798920000001">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:375 @ 05/18/26 23:08:31.133&#xA;merged result sha: 88e7024f886d63ab71e83c61932e71be58a7c3ee for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:375 @ 05/18/26 23:08:32.489 (1.356s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:32.489&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:32.489 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="20.023992627">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:385 @ 05/18/26 23:08:32.489&#xA;Push PipelineRun has not been created yet for the component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:385 @ 05/18/26 23:08:52.513 (20.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:52.513&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:08:52.513 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="passed" time="260.013038373">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:401 @ 05/18/26 23:08:52.514&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 found for Component build-e2e-lslq/gl-multi-component-parent-skrg&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Running&#xA;PipelineRun gl-multi-component-parent-skrg-on-push-xfq48 reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:401 @ 05/18/26 23:13:12.526 (4m20.013s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:13:12.527&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:13:12.527 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="failed" time="1217.33079781">
              <failure message="Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-xtnlmv repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true" type="failed">[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-xtnlmv repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:427 @ 05/18/26 23:33:12.528&#xA;</failure>
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:412 @ 05/18/26 23:13:12.527&#xA;[FAILED] Timed out after 1200.001s.&#xA;timed out when waiting for component nudge PR to be created in build-nudge-child-xtnlmv repository&#xA;Expected&#xA;    &lt;bool&gt;: false&#xA;to be true&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:427 @ 05/18/26 23:33:12.528&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:412 @ 05/18/26 23:33:12.528 (20m0.001s)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:33:12.529&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:33:29.605 (17.076s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:33:29.605&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:33:29.858 (253ms)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:429 @ 05/18/26 23:33:29.859&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider gl component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, gitlab]" classname="Red Hat App Studio E2E tests" status="skipped" time="0">
              <skipped message="skipped - Spec skipped because an earlier spec in an ordered container failed"></skipped>
              <system-err>[SKIPPED] Spec skipped because an earlier spec in an ordered container failed&#xA;In [It] at: /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:440 @ 05/18/26 23:33:29.859&#xA;</system-err>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if release CR is created [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies the release pipelinerun is running and succeeds [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies release CR completed and set succeeded. [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [release-pipelines-suite e2e tests for release-to-github pipeline] Release-to-github happy path Post-release verification verifies if the Release exists in github repo [release-pipelines, release-to-github, releaseToGithub]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private correctly targets the default branch (that is not named &#39;main&#39;) with PaC [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="70.196761725">
              <system-err>&gt; Enter [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:53:19.562&#xA;&lt; Exit [BeforeAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:54 @ 05/18/26 22:53:48.292 (28.73s)&#xA;&gt; Enter [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:53:48.292&#xA;Image repository for component fj-test-custom-default-ypiang in namespace build-e2e-xnaw do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [BeforeAll] when a new component without specified branch is created and with visibility private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:117 @ 05/18/26 22:53:58.758 (10.466s)&#xA;&gt; Enter [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:53:58.758&#xA;&lt; Exit [It] correctly targets the default branch (that is not named &#39;main&#39;) with PaC - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:136 @ 05/18/26 22:54:29.758 (31s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:29.758&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:29.758 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private workspace parameter is set correctly in PaC repository CR [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.201716505">
              <system-err>&gt; Enter [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:54:29.758&#xA;&lt; Exit [It] workspace parameter is set correctly in PaC repository CR - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:153 @ 05/18/26 22:54:29.96 (201ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:29.96&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:29.96 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="20.212781966">
              <system-err>&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 22:54:29.961&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:176 @ 05/18/26 22:54:50.173 (20.212s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.173&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.173 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private build pipeline uses the correct serviceAccount [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000302418">
              <system-err>&gt; Enter [It] build pipeline uses the correct serviceAccount - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:191 @ 05/18/26 22:54:50.174&#xA;&lt; Exit [It] build pipeline uses the correct serviceAccount - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:191 @ 05/18/26 22:54:50.174 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.174&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.174 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private component build status is set correctly [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.012860306">
              <system-err>&gt; Enter [It] component build status is set correctly - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:195 @ 05/18/26 22:54:50.174&#xA;build status annotation value: {&#34;pac&#34;:{&#34;state&#34;:&#34;enabled&#34;,&#34;merge-url&#34;:&#34;https://codeberg.org/konflux-qe/devfile-sample-hello-world-ykkztl/pulls/1&#34;,&#34;configuration-time&#34;:&#34;Mon, 18 May 2026 22:54:26 UTC&#34;},&#34;message&#34;:&#34;done&#34;}&#xA;state: enabled&#xA;mergeUrl: https://codeberg.org/konflux-qe/devfile-sample-hello-world-ykkztl/pulls/1&#xA;errId: 0&#xA;errMessage: &#xA;configurationTime: Mon, 18 May 2026 22:54:26 UTC&#xA;&lt; Exit [It] component build status is set correctly - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:195 @ 05/18/26 22:54:50.187 (13ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.187&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:50.187 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.171197376">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:225 @ 05/18/26 22:54:50.188&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:225 @ 05/18/26 22:54:51.358 (1.171s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:51.359&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:51.359 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private created image repo is private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.284976801">
              <system-err>&gt; Enter [It] created image repo is private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:243 @ 05/18/26 22:54:51.359&#xA;&lt; Exit [It] created image repo is private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:243 @ 05/18/26 22:54:51.643 (284ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:51.644&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:54:51.644 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private a related PipelineRun should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="27.091170092">
              <system-err>&gt; Enter [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:249 @ 05/18/26 22:54:51.645&#xA;&lt; Exit [It] a related PipelineRun should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:249 @ 05/18/26 22:55:18.735 (27.091s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:18.736&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:18.736 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private PR branch should not exist in the repo [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="1.536513705">
              <system-err>&gt; Enter [It] PR branch should not exist in the repo - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:265 @ 05/18/26 22:55:18.736&#xA;&lt; Exit [It] PR branch should not exist in the repo - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:265 @ 05/18/26 22:55:20.272 (1.536s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:20.272&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:20.273 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new component without specified branch is created and with visibility private related image repo and the robot account should be deleted after deleting the component [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, pac-custom-default-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="2.156601961">
              <system-err>&gt; Enter [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:278 @ 05/18/26 22:55:20.273&#xA;&lt; Exit [It] related image repo and the robot account should be deleted after deleting the component - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:278 @ 05/18/26 22:55:22.429 (2.156s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:22.429&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:55:22.43 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created triggers a PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="70.130973102">
              <system-err>&gt; Enter [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:306 @ 05/18/26 22:55:22.43&#xA;&lt; Exit [BeforeAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:306 @ 05/18/26 22:55:32.468 (10.038s)&#xA;&gt; Enter [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:332 @ 05/18/26 22:55:32.468&#xA;PipelineRun has not been created yet for the component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun has not been created yet for the component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun has not been created yet for the component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;&lt; Exit [It] triggers a PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:332 @ 05/18/26 22:56:32.561 (1m0.093s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:32.561&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:32.561 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should lead to a PaC init PR creation [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.437678884">
              <system-err>&gt; Enter [It] should lead to a PaC init PR creation - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:347 @ 05/18/26 22:56:32.562&#xA;&lt; Exit [It] should lead to a PaC init PR creation - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:347 @ 05/18/26 22:56:32.999 (437ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:32.999&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 22:56:32.999 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created the PipelineRun should eventually finish successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="2091.659193239">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:365 @ 05/18/26 22:56:33&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh found for Component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh reason: Running&#xA;attempt 1/3: PipelineRun &#34;fj-test-custom-branch-rbrwsj-on-pull-request-pw2lh&#34; failed: context deadline exceededNew PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq found after retrigger for component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq found for Component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-td4cq reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:365 @ 05/18/26 23:31:24.658 (34m51.659s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:24.659&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:24.659 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image repo and robot account created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.871999272">
              <system-err>&gt; Enter [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:371 @ 05/18/26 23:31:24.659&#xA;&lt; Exit [It] image repo and robot account created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:371 @ 05/18/26 23:31:25.531 (872ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:25.531&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:25.531 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created created image repo is public [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.288858049">
              <system-err>&gt; Enter [It] created image repo is public - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:390 @ 05/18/26 23:31:25.532&#xA;&lt; Exit [It] created image repo is public - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:390 @ 05/18/26 23:31:25.821 (288ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:25.821&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:25.821 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created image tag is updated successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.359484766">
              <system-err>&gt; Enter [It] image tag is updated successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:396 @ 05/18/26 23:31:25.822&#xA;Image tag quay.io/redhat-appstudio-qe/build-e2e-xnaw/fj-test-custom-branch-rbrwsj:on-pr-af25ea1ac72b14b80c1825c0c11e565c022c2d75 successfully found in Quay&#xA;&lt; Exit [It] image tag is updated successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:396 @ 05/18/26 23:31:26.18 (359ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:26.181&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:26.181 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created should ensure pruning labels are set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.392458072">
              <system-err>&gt; Enter [It] should ensure pruning labels are set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:425 @ 05/18/26 23:31:26.181&#xA;&lt; Exit [It] should ensure pruning labels are set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:425 @ 05/18/26 23:31:26.574 (392ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:26.574&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:26.574 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when a new Component with specified custom branch is created eventually leads to the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.559524721">
              <system-err>&gt; Enter [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:439 @ 05/18/26 23:31:26.574&#xA;&lt; Exit [It] eventually leads to the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:439 @ 05/18/26 23:31:26.574 (0s)&#xA;&gt; Enter [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:324 @ 05/18/26 23:31:26.575&#xA;&lt; Exit [AfterAll] when a new Component with specified custom branch is created - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:324 @ 05/18/26 23:31:27.133 (559ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:27.134&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:27.134 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="21.336791484">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is updated - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:454 @ 05/18/26 23:31:27.135&#xA;created file sha: 70594494435f3e9edf1d68ca836239ce5d9d80ef&#xA;&lt; Exit [BeforeAll] when the PaC init branch is updated - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:454 @ 05/18/26 23:31:28.442 (1.307s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:464 @ 05/18/26 23:31:28.442&#xA;PipelineRun has not been created yet for the component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:464 @ 05/18/26 23:31:48.471 (20.029s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:48.471&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:48.471 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated should lead to a PaC init PR update [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.456568312">
              <system-err>&gt; Enter [It] should lead to a PaC init PR update - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:479 @ 05/18/26 23:31:48.472&#xA;&lt; Exit [It] should lead to a PaC init PR update - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:479 @ 05/18/26 23:31:48.928 (456ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:48.928&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:31:48.928 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated PipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="260.01765097">
              <system-err>&gt; Enter [It] PipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:498 @ 05/18/26 23:31:48.929&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x found for Component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-pull-request-qt86x reason: Succeeded&#xA;&lt; Exit [It] PipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:498 @ 05/18/26 23:36:08.946 (4m20.017s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:08.946&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:08.947 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is updated eventually leads to another update of a PR about the PipelineRun status report at Checks tab [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.000264066">
              <system-err>&gt; Enter [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:504 @ 05/18/26 23:36:08.947&#xA;&lt; Exit [It] eventually leads to another update of a PR about the PipelineRun status report at Checks tab - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:504 @ 05/18/26 23:36:08.947 (0s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:08.947&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:08.947 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged eventually leads to triggering another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="22.799505367">
              <system-err>&gt; Enter [BeforeAll] when the PaC init branch is merged - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:520 @ 05/18/26 23:36:08.948&#xA;merged result sha: 627d98fadeb51bb75630fb45cafc6252a6e6ec9e&#xA;&lt; Exit [BeforeAll] when the PaC init branch is merged - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:520 @ 05/18/26 23:36:11.722 (2.775s)&#xA;&gt; Enter [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:530 @ 05/18/26 23:36:11.723&#xA;PipelineRun has not been created yet for the component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;&lt; Exit [It] eventually leads to triggering another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:530 @ 05/18/26 23:36:31.747 (20.024s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:31.747&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:36:31.747 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="260.018299067">
              <system-err>&gt; Enter [It] pipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:546 @ 05/18/26 23:36:31.748&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr found for Component build-e2e-xnaw/fj-test-custom-branch-rbrwsj&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Running&#xA;PipelineRun fj-test-custom-branch-rbrwsj-on-push-k2jzr reason: Succeeded&#xA;&lt; Exit [It] pipelineRun should eventually finish - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:546 @ 05/18/26 23:40:51.766 (4m20.018s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:40:51.766&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:40:51.766 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged does not have expiration set [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.440469072">
              <system-err>&gt; Enter [It] does not have expiration set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:552 @ 05/18/26 23:40:51.767&#xA;&lt; Exit [It] does not have expiration set - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:552 @ 05/18/26 23:40:52.207 (440ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:40:52.207&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:40:52.207 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged After updating image visibility to private, it should not trigger another PipelineRun [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="120.741332155">
              <system-err>&gt; Enter [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:564 @ 05/18/26 23:40:52.207&#xA;waiting for one minute and expecting to not trigger a PipelineRun&#xA;&lt; Exit [It] After updating image visibility to private, it should not trigger another PipelineRun - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:564 @ 05/18/26 23:42:52.948 (2m0.741s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:42:52.949&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:42:52.949 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged image repo is updated to private [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="0.281672293">
              <system-err>&gt; Enter [It] image repo is updated to private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:595 @ 05/18/26 23:42:52.95&#xA;&lt; Exit [It] image repo is updated to private - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:595 @ 05/18/26 23:42:53.231 (281ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:42:53.231&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:42:53.231 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retrigger the pipeline manually [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the PaC init branch is merged retriggered pipelineRun should eventually finish [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed related image repo and robot accounts deleted [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="7.174957989">
              <system-err>&gt; Enter [BeforeAll] when the component is removed - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:649 @ 05/18/26 23:42:53.232&#xA;&lt; Exit [BeforeAll] when the component is removed - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:649 @ 05/18/26 23:42:54.263 (1.031s)&#xA;&gt; Enter [It] related image repo and robot accounts deleted - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:661 @ 05/18/26 23:42:54.264&#xA;&lt; Exit [It] related image repo and robot accounts deleted - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:661 @ 05/18/26 23:43:00.407 (6.143s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:43:00.407&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:43:00.407 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj PaC component build when the component is removed purge PR is created successfully [build-service, github-webhook, pac-build, pipeline, image-controller, forgejo, build-custom-branch]" classname="Red Hat App Studio E2E tests" status="passed" time="3.669451259">
              <system-err>&gt; Enter [It] purge PR is created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:679 @ 05/18/26 23:43:00.408&#xA;Found purge PR with id: 3&#xA;&lt; Exit [It] purge PR is created successfully - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:679 @ 05/18/26 23:43:00.877 (469ms)&#xA;&gt; Enter [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:43:00.877&#xA;&lt; Exit [AfterAll] PaC component build - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:101 @ 05/18/26 23:43:04.077 (3.2s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:43:04.077&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/pac_build.go:28 @ 05/18/26 23:43:04.077 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context points to a file [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles from specific context [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params when context is the root directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when context points to a file and a directory [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params creates Tekton bundles when using negation [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding HOME environment variable [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [task-suite tkn bundle task] creates Tekton bundles with different params allows overriding STEP image [build-templates]" classname="Red Hat App Studio E2E tests" status="pending" time="0">
              <skipped message="pending"></skipped>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace creates component with nudges [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="100.993043467">
              <system-err>&gt; Enter [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:53:19.36&#xA;ReleaseAdmissionPlan data: {&#34;Mapping&#34;:{&#34;Components&#34;:[{&#34;Name&#34;:&#34;fj-multi-component-parent-dnxz&#34;,&#34;Repository&#34;:&#34;quay.io/redhat-appstudio-qe/release-repository&#34;}]}}&#xA;&lt; Exit [BeforeAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:72 @ 05/18/26 22:54:40.096 (1m20.736s)&#xA;&gt; Enter [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:54:40.096&#xA;Image repository for component fj-multi-component-child-dnxz in namespace build-e2e-bpdy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;Image repository for component fj-multi-component-parent-dnxz in namespace build-e2e-bpdy do not have right state (&#39;&#39; != &#39;ready&#39;) yet but it has status {  { } {&lt;nil&gt;      } []}.&#xA;&lt; Exit [It] creates component with nudges - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:235 @ 05/18/26 22:55:00.351 (20.255s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:55:00.351&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:55:00.351 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace triggers a PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="60.07129648">
              <system-err>&gt; Enter [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 22:55:00.352&#xA;PipelineRun has not been created yet for the component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun has not been created yet for the component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun has not been created yet for the component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;&lt; Exit [It] triggers a PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:259 @ 05/18/26 22:56:00.423 (1m0.071s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:56:00.423&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 22:56:00.423 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2443.44906378">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:274 @ 05/18/26 22:56:00.424&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh found for Component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: PipelineRunStopping&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-fwklh reason: Failed&#xA;attempt 1/3: PipelineRun &#34;fj-multi-component-parent-dnxz-on-pull-request-fwklh&#34; failed: &#xA; pod: fj-multi-component-parent-dnxz-on-pull-request-fwklh-init-pod | init container: prepare&#xA;2026/05/18 22:55:55 Entrypoint initialization&#xA;&#xA;pod: fj-multi-component-parent-dnxz-on-pull-request-fwklh-init-pod | container step-init: &#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T22:55:58Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 found after retrigger for component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 found for Component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: ResolvingTaskRef&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-jh5x8 reason: Running&#xA;attempt 2/3: PipelineRun &#34;fj-multi-component-parent-dnxz-on-pull-request-jh5x8&#34; failed: context deadline exceededNew PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl found after retrigger for component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl found for Component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-pull-request-l4nwl reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:274 @ 05/18/26 23:36:43.872 (40m43.449s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:36:43.873&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:36:43.873 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace the PipelineRun should eventually finish successfully for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="251.776584099">
              <system-err>&gt; Enter [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:285 @ 05/18/26 23:36:43.873&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-l4w7p found for Component build-e2e-bpdy/fj-multi-component-child-dnxz&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-l4w7p reason: Failed&#xA;attempt 1/3: PipelineRun &#34;fj-multi-component-child-dnxz-on-pull-request-l4w7p&#34; failed: &#xA; pod: fj-multi-component-child-dnxz-on-pull-request-l4w7p-init-pod | init container: prepare&#xA;2026/05/18 22:55:44 Entrypoint initialization&#xA;&#xA;pod: fj-multi-component-child-dnxz-on-pull-request-l4w7p-init-pod | container step-init: &#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[param] enable: false&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[param] default-http-proxy: squid.caching.svc.cluster.local:3128&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[param] default-no-proxy: brew.registry.redhat.io,docker.io,gcr.io,ghcr.io,images.paas.redhat.com,mirror.gcr.io,nvcr.io,quay.io,registry-proxy.engineering.redhat.com,registry.access.redhat.com,registry.ci.openshift.org,registry.fedoraproject.org,registry.redhat.io,registry.stage.redhat.io,vault.habana.ai&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[param] http-proxy-result-path: /tekton/results/http-proxy&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[param] no-proxy-result-path: /tekton/results/no-proxy&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;Using in-cluster config&#34; logger=KubeClient&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;Cache proxy is disabled via param&#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[result] HTTP PROXY: &#34;&#xA;time=&#34;2026-05-18T22:55:47Z&#34; level=info msg=&#34;[result] NO PROXY: &#34;&#xA;New PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj found after retrigger for component build-e2e-bpdy/fj-multi-component-child-dnxz&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj found for Component build-e2e-bpdy/fj-multi-component-child-dnxz&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Running&#xA;PipelineRun fj-multi-component-child-dnxz-on-pull-request-f2tlj reason: Succeeded&#xA;&lt; Exit [It] the PipelineRun should eventually finish successfully for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:285 @ 05/18/26 23:40:55.65 (4m11.776s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:55.65&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:55.65 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="0.429917244">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:289 @ 05/18/26 23:40:55.651&#xA;&lt; Exit [It] should lead to a PaC PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:289 @ 05/18/26 23:40:56.08 (430ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:56.08&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:56.08 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.291331755">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:307 @ 05/18/26 23:40:56.081&#xA;merged result sha: 396de338366b7b4a5451e377dcda030e43c39ee8 for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:307 @ 05/18/26 23:40:58.372 (2.291s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:58.372&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:40:58.372 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace create dockerfile and yaml manifest that references build and distribution repositories [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="7.855689414">
              <system-err>&gt; Enter [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:318 @ 05/18/26 23:40:58.373&#xA;&lt; Exit [It] create dockerfile and yaml manifest that references build and distribution repositories - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:318 @ 05/18/26 23:41:06.228 (7.855s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:06.228&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:06.228 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a PaC PR creation for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="0.193317839">
              <system-err>&gt; Enter [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:358 @ 05/18/26 23:41:06.229&#xA;&lt; Exit [It] should lead to a PaC PR creation for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:358 @ 05/18/26 23:41:06.422 (193ms)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:06.422&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:06.422 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Merging the PaC PR should be successful for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.291215325">
              <system-err>&gt; Enter [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:375 @ 05/18/26 23:41:06.423&#xA;merged result sha: 6fccbc7a5557beef36edadee57e775401d92febc for PR #1&#xA;&lt; Exit [It] Merging the PaC PR should be successful for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:375 @ 05/18/26 23:41:08.714 (2.291s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:08.714&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:08.714 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PR merge triggers PAC PipelineRun for parent component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="20.028726377">
              <system-err>&gt; Enter [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:385 @ 05/18/26 23:41:08.715&#xA;Push PipelineRun has not been created yet for the component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;&lt; Exit [It] PR merge triggers PAC PipelineRun for parent component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:385 @ 05/18/26 23:41:28.743 (20.028s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:28.743&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:41:28.743 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace PAC PipelineRun for parent component  is successful [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="240.017324794">
              <system-err>&gt; Enter [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:401 @ 05/18/26 23:41:28.744&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 found for Component build-e2e-bpdy/fj-multi-component-parent-dnxz&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Running&#xA;PipelineRun fj-multi-component-parent-dnxz-on-push-gn5x8 reason: Succeeded&#xA;&lt; Exit [It] PAC PipelineRun for parent component  is successful - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:401 @ 05/18/26 23:45:28.761 (4m0.017s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:28.761&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:28.761 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace should lead to a nudge PR creation for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="20.715283775">
              <system-err>&gt; Enter [It] should lead to a nudge PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:412 @ 05/18/26 23:45:28.762&#xA;&lt; Exit [It] should lead to a nudge PR creation for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:412 @ 05/18/26 23:45:49.477 (20.715s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:49.477&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:49.477 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace merging the PR should be successful for child component  [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="2.413410808">
              <system-err>&gt; Enter [It] merging the PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:429 @ 05/18/26 23:45:49.477&#xA;merged result sha: e00cc388467d48c531636afae9d01f4d8db354fa for PR #3&#xA;&lt; Exit [It] merging the PR should be successful for child component  - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:429 @ 05/18/26 23:45:51.89 (2.413s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:51.89&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:45:51.891 (0s)&#xA;</system-err>
          </testcase>
          <testcase name="[It] [build-service-suite Build service E2E tests] test git provider fj component update with renovate when components are created in same namespace Verify the nudge updated the contents [build-service, renovate, multi-component, forgejo]" classname="Red Hat App Studio E2E tests" status="passed" time="30.587126373">
              <system-err>&gt; Enter [It] Verify the nudge updated the contents - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:440 @ 05/18/26 23:45:51.891&#xA;Verifying Dockerfile.tmp updated to sha sha256:dc6715daa5926e09aa9b302d2660b4e1092d0dfa4981594c31517b9accc60168content: FROM quay.io/redhat-appstudio-qe/build-e2e-bpdy/fj-multi-component-parent-dnxz@sha256:dc6715daa5926e09aa9b302d2660b4e1092d0dfa4981594c31517b9accc60168&#xA;RUN echo hello&#xA;&#xA;&lt; Exit [It] Verify the nudge updated the contents - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:440 @ 05/18/26 23:45:52.225 (333ms)&#xA;&gt; Enter [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:45:52.225&#xA;&lt; Exit [AfterAll] component update with renovate - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:214 @ 05/18/26 23:46:22.478 (30.253s)&#xA;&gt; Enter [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:46:22.478&#xA;&lt; Exit [AfterEach] [build-service-suite Build service E2E tests] - /tmp/tmp.5k64aXXzs4/tests/build/renovate.go:28 @ 05/18/26 23:46:22.478 (0s)&#xA;</system-err>
          </testcase>
      </testsuite>
  </testsuites>