2026-02-16T11:31:49Z INFO setup Initializing metrics certificate watcher using provided certificates {"metrics-cert-path": "/tmp/k8s-metrics-server/metrics-certs", "metrics-cert-name": "tls.crt", "metrics-cert-key": "tls.key"} 2026-02-16T11:31:49Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-metrics-server/metrics-certs/tls.crt", "key": "/tmp/k8s-metrics-server/metrics-certs/tls.key"} 2026-02-16T11:31:49Z INFO setup Initializing webhook certificate watcher using provided certificates {"webhook-cert-path": "/tmp/k8s-webhook-server/serving-certs", "webhook-cert-name": "tls.crt", "webhook-cert-key": "tls.key"} 2026-02-16T11:31:49Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2026-02-16T11:31:49Z INFO controller-runtime.builder Registering a mutating webhook {"GVK": "tekton.dev/v1, Kind=PipelineRun", "path": "/mutate-tekton-dev-v1-pipelinerun"} 2026-02-16T11:31:49Z INFO controller-runtime.webhook Registering webhook {"path": "/mutate-tekton-dev-v1-pipelinerun"} 2026-02-16T11:31:49Z INFO setup Adding config watcher to manager 2026-02-16T11:31:49Z INFO setup Adding webhook certificate watcher to manager 2026-02-16T11:31:49Z INFO setup Adding metrics certificate watcher to manager 2026-02-16T11:31:49Z INFO setup starting manager 2026-02-16T11:31:49Z INFO controller-runtime.metrics Starting metrics server 2026-02-16T11:31:49Z INFO setup disabling http/2 2026-02-16T11:31:49Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2026-02-16T11:31:49Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8443", "secure": true} 2026-02-16T11:31:49Z INFO controller-runtime.webhook Starting webhook server 2026-02-16T11:31:49Z INFO setup disabling http/2 2026-02-16T11:31:49Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2026-02-16T11:31:49Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2026-02-16T11:31:49Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-metrics-server/metrics-certs/tls.crt", "key": "/tmp/k8s-metrics-server/metrics-certs/tls.key", "interval": "10s"} 2026-02-16T11:31:49Z INFO Starting EventSource {"controller": "webhook-config", "controllerGroup": "", "controllerKind": "ConfigMap", "source": "kind source: *v1.ConfigMap"} 2026-02-16T11:31:49Z INFO Starting Controller {"controller": "webhook-config", "controllerGroup": "", "controllerKind": "ConfigMap"} 2026-02-16T11:31:49Z INFO Starting workers {"controller": "webhook-config", "controllerGroup": "", "controllerKind": "ConfigMap", "worker count": 1} 2026-02-16T11:31:49Z INFO Reconciling ConfigMap {"controller": "webhook-config", "controllerGroup": "", "controllerKind": "ConfigMap", "ConfigMap": {"name":"tekton-kueue-config","namespace":"tekton-kueue"}, "namespace": "tekton-kueue", "name": "tekton-kueue-config", "reconcileID": "573e40ec-c615-49c2-88b5-ab0d02fda07a"} 2026-02-16T11:31:49Z INFO config-store Updating config {"config": "queueName: pipelines-queue\ncel:\n expressions:\n # Set resource requests for multi platform pipelines\n - |\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms') ?\n pipelineRun.spec.params.filter(\n p,\n p.name == 'build-platforms')[0]\n .value.map(\n p,\n resource(replace(replace(p, \"/\", \"-\"), \"_\", \"-\"), 1)\n ) : []\n\n # Request AWS IP for AWS-based platforms\n - |\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms') ?\n pipelineRun.spec.params.filter(\n p,\n p.name == 'build-platforms')[0]\n .value.filter(\n p,\n !(\n p in [\n 'linux/ppc64le',\n 'linux/s390x',\n 'linux/x86_64',\n 'local',\n 'localhost',\n ]\n )\n ).map(\n p,\n resource('aws-ip', 1)\n ) : []\n\n # Set resource requests for multi platform pipelines which doesn't use the build-platforms parameter (old style)\n - |\n !(\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms')\n ) &&\n has(pipelineRun.spec.pipelineSpec) &&\n has(pipelineRun.spec.pipelineSpec.tasks) &&\n pipelineRun.spec.pipelineSpec.tasks.size() > 0 ?\n pipelineRun.spec.pipelineSpec.tasks.map(\n task,\n has(task.params) ? task.params.filter(p, p.name == 'PLATFORM') : []\n )\n .filter(p, p.size() > 0)\n .map(\n p,\n resource(replace(replace(p[0].value, \"/\", \"-\"), \"_\", \"-\"), 1)\n ) : []\n\n # Request AWS IP for AWS-based platforms which doesn't use the build-platforms parameter (old style)\n - |\n !(\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms')\n ) &&\n has(pipelineRun.spec.pipelineSpec) &&\n has(pipelineRun.spec.pipelineSpec.tasks) &&\n pipelineRun.spec.pipelineSpec.tasks.size() > 0 ?\n pipelineRun.spec.pipelineSpec.tasks.map(\n task,\n has(task.params) ? task.params.filter(p, p.name == 'PLATFORM') : []\n )\n .filter(p, p.size() > 0)\n .filter(\n p,\n !(\n p[0].value in [\n 'linux/ppc64le',\n 'linux/s390x',\n 'linux/x86_64',\n 'local',\n 'localhost',\n ]\n )\n )\n .map(\n p,\n resource('aws-ip', 1)\n ) : []\n\n # Set mintmaker resource requests.\n # Necessary since mintmaker refreshes can overload clusters without a\n # bottleneck on the number of pipelineruns running.\n - |\n plrNamespace == 'mintmaker' ? [resource('mintmaker', 1)] : []\n\n # Set the pipeline priority\n - |\n pacEventType == 'push' ? priority('konflux-post-merge-build') :\n pacEventType == 'pull_request' ? priority('konflux-pre-merge-build') :\n pacTestEventType == 'push' ? priority('konflux-post-merge-test') :\n pacTestEventType == 'pull_request' ? priority('konflux-pre-merge-test') :\n\n has(pipelineRun.metadata.labels) &&\n 'appstudio.openshift.io/service' in pipelineRun.metadata.labels &&\n pipelineRun.metadata.labels['appstudio.openshift.io/service'] == 'release' &&\n 'pipelines.appstudio.openshift.io/type' in pipelineRun.metadata.labels &&\n pipelineRun.metadata.labels['pipelines.appstudio.openshift.io/type'] == 'managed' ?\n priority('konflux-release') :\n\n has(pipelineRun.metadata.labels) &&\n 'appstudio.openshift.io/service' in pipelineRun.metadata.labels &&\n pipelineRun.metadata.labels['appstudio.openshift.io/service'] == 'release' &&\n 'pipelines.appstudio.openshift.io/type' in pipelineRun.metadata.labels &&\n pipelineRun.metadata.labels['pipelines.appstudio.openshift.io/type'] == 'tenant' ?\n priority('konflux-tenant-release') :\n\n plrNamespace == 'mintmaker' ? priority('konflux-dependency-update') :\n\n has(pipelineRun.metadata.labels) &&\n 'internal-services.appstudio.openshift.io/pipelinerun-uid' in pipelineRun.metadata.labels ?\n priority('konflux-release') :\n\n priority('konflux-default')\n"} 2026-02-16T11:31:49Z INFO config-store Updated config {"config": {"queueName":"pipelines-queue","cel":{"expressions":["has(pipelineRun.spec.params) &&\npipelineRun.spec.params.exists(p, p.name == 'build-platforms') ?\npipelineRun.spec.params.filter(\n p,\n p.name == 'build-platforms')[0]\n.value.map(\n p,\n resource(replace(replace(p, \"/\", \"-\"), \"_\", \"-\"), 1)\n) : []\n","has(pipelineRun.spec.params) &&\npipelineRun.spec.params.exists(p, p.name == 'build-platforms') ?\npipelineRun.spec.params.filter(\n p,\n p.name == 'build-platforms')[0]\n.value.filter(\n p,\n !(\n p in [\n 'linux/ppc64le',\n 'linux/s390x',\n 'linux/x86_64',\n 'local',\n 'localhost',\n ]\n )\n).map(\n p,\n resource('aws-ip', 1)\n) : []\n","!(\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms')\n) &&\nhas(pipelineRun.spec.pipelineSpec) &&\nhas(pipelineRun.spec.pipelineSpec.tasks) &&\npipelineRun.spec.pipelineSpec.tasks.size() > 0 ?\npipelineRun.spec.pipelineSpec.tasks.map(\n task,\n has(task.params) ? task.params.filter(p, p.name == 'PLATFORM') : []\n)\n.filter(p, p.size() > 0)\n.map(\n p,\n resource(replace(replace(p[0].value, \"/\", \"-\"), \"_\", \"-\"), 1)\n) : []\n","!(\n has(pipelineRun.spec.params) &&\n pipelineRun.spec.params.exists(p, p.name == 'build-platforms')\n) &&\nhas(pipelineRun.spec.pipelineSpec) &&\nhas(pipelineRun.spec.pipelineSpec.tasks) &&\npipelineRun.spec.pipelineSpec.tasks.size() > 0 ?\npipelineRun.spec.pipelineSpec.tasks.map(\n task,\n has(task.params) ? task.params.filter(p, p.name == 'PLATFORM') : []\n)\n.filter(p, p.size() > 0)\n.filter(\n p,\n !(\n p[0].value in [\n 'linux/ppc64le',\n 'linux/s390x',\n 'linux/x86_64',\n 'local',\n 'localhost',\n ]\n )\n)\n.map(\n p,\n resource('aws-ip', 1)\n) : []\n","plrNamespace == 'mintmaker' ? [resource('mintmaker', 1)] : []\n","pacEventType == 'push' ? priority('konflux-post-merge-build') :\npacEventType == 'pull_request' ? priority('konflux-pre-merge-build') :\npacTestEventType == 'push' ? priority('konflux-post-merge-test') :\npacTestEventType == 'pull_request' ? priority('konflux-pre-merge-test') :\n\nhas(pipelineRun.metadata.labels) &&\n'appstudio.openshift.io/service' in pipelineRun.metadata.labels &&\npipelineRun.metadata.labels['appstudio.openshift.io/service'] == 'release' &&\n'pipelines.appstudio.openshift.io/type' in pipelineRun.metadata.labels &&\npipelineRun.metadata.labels['pipelines.appstudio.openshift.io/type'] == 'managed' ?\npriority('konflux-release') :\n\nhas(pipelineRun.metadata.labels) &&\n'appstudio.openshift.io/service' in pipelineRun.metadata.labels &&\npipelineRun.metadata.labels['appstudio.openshift.io/service'] == 'release' &&\n'pipelines.appstudio.openshift.io/type' in pipelineRun.metadata.labels &&\npipelineRun.metadata.labels['pipelines.appstudio.openshift.io/type'] == 'tenant' ?\npriority('konflux-tenant-release') :\n\nplrNamespace == 'mintmaker' ? priority('konflux-dependency-update') :\n\nhas(pipelineRun.metadata.labels) &&\n'internal-services.appstudio.openshift.io/pipelinerun-uid' in pipelineRun.metadata.labels ?\npriority('konflux-release') :\n\npriority('konflux-default')\n"]}}}