2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=0fe91382401630df2c26c5525dd9eb9c0df1b0ef logger=setup/version v=2 version=v1.17.1 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-03-11T17:15:33Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:415 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:431 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:440 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:445 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:453 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:461 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:477 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:491 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:505 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:511 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:525 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:546 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/pkg/config/config.go:561 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-11T17:15:33Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-03-11T17:15:33Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-03-11T17:15:33Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-03-11T17:15:34Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-03-11T17:15:34Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-58c9d79bd8-z5bxp logger=setup/leader-election v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-03-11T17:15:34Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-11T17:15:34Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-03-11T17:15:35Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-03-11T17:15:35Z INF github.com/kyverno/kyverno/pkg/logging/log.go:180 > 2026/03/11 17:15:35 http: TLS handshake error from 10.244.0.1:34198: secret "kyverno-svc.kyverno.svc.kyverno-tls-pair" not found logger=webhooks/server v=0 2026-03-11T17:15:42Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=1ccb68e3-9a1c-49b6-9486-248384a8aa90 v=2 2026-03-11T17:15:42Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-03-11T17:15:42Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-03-11T17:15:42Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=25d00481-8803-41bc-b946-d063bc5c531e v=2 2026-03-11T17:16:34Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=47770e4b-c24f-447c-a456-02acafd05986 v=2 2026-03-11T17:16:34Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-03-11T17:16:36Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=594ae067-0510-4cd4-baaa-7735e4f9d599 v=2 2026-03-11T17:16:36Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-03-11T17:16:36Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:256 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-03-11T17:18:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=6597e318-0350-44b0-a4ec-1defb74446f0 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=08d51ea5a12e170b94a64b75281c7f5ead0c5d3b010132384bb3d1f9640c9a72"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-11T17:18:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=189286b6-d523-40b8-af2b-036dc61021d3 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=08d51ea5a12e170b94a64b75281c7f5ead0c5d3b010132384bb3d1f9640c9a72"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-11T17:26:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-xefy namespace=build-e2e-xefy operation=CREATE policy=deny-virtual-domain resource=build-e2e-xefy/Namespace/build-e2e-xefy resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=df639b99-4988-4acf-9112-62ea363f0231 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=08d51ea5a12e170b94a64b75281c7f5ead0c5d3b010132384bb3d1f9640c9a72"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-11T17:27:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-pull-request-r9qsj-init-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0a913f48-0bda-46c4-a9e2-43d3ea1966b0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:28:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c3a2e375672798884fd7bc92d68150c7726467afd54fc8d0997-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=985a7781-2178-4b52-b6e4-66375f484c19 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:28:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-3a2e37567279e4e76537914036ff56ff9b9ae2a18e04-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=efffc27e-fa46-4804-8604-cabbf868e7f4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custo3a2e37567279885ffc302ef7c975517963bcaf17dcde04-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8313d61f-e6bf-44cc-85f2-8ef5bbd07512 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-3a2e375672798884fd1d2d4775df0050211b48bb6baccc2ba4d655b4-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6a1430ff-74ca-49bc-af52-620c47bd1fbb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw7cff4419a2efc0dd889dc3867c8dfd45-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b8ec305f-ddfc-4293-ac25-5da015a8e020 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw3f13a4d3784eff41e5a640fbd3f4ce53-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=af02ea1a-2837-452a-8d9c-71569745e82c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-3a2e375672792c8d98b2c9d3eb5898a481c09f33dfce-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1cb1f7c0-54ed-4662-9059-01b6e9e9b9b9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwa675edd6d4d268758c081c07872f50a2-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0023fc8d-3586-444f-8b8d-4ddd875ea68f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-3a2e375672798884fd1d2d479c91c6806a187fc513b98b4027021652-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4947cc89-4a23-451e-9591-a12c246f308b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom3a2e3756727982b5afcfd8689c198facf4f8ac17398b9-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ad4bf9a-e6e5-4dd4-a3a8-9146cc65b502 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cust3a2e375672798881552e2a1c4399680832d9a5fc46a55ce-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=91e326ef-28b5-4852-a607-abe1451ef618 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwfab6459b6034e7ed70f52d8060e1ad66-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a6eaf013-fbf6-455b-b897-5e443c05360d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-3a2e37567279a41db510246324d96f8e91f5d6e7e740-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0c269b65-821d-4c49-bdf8-ae191ff851c3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:38:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cus3a2e375672798884d878c160eac36fae5dca5a96e6c9fb61-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8af49d04-bdd2-4ad8-bcd2-811795942d5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:42:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-pull-request-dwm55-init-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0fb2338b-a267-4ca1-91dc-47ca5e5d49a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:42:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-ce47829857ffad5dcbf2209d8317d8672557cd52a5904167ba2-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4029d2f-0e0c-4e94-b5f5-7cf44b9ca513 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:42:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-e47829857ffac8d7f65e3822992379880e6afdba3624-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d384d689-8d28-48ba-9cd7-34ed125f6951 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:51:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custoe47829857ffad55ee43d69bb644f0eb4e9fb947058f811-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=29b32092-a0ff-4fd4-84f3-209d3f676800 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-e47829857ffad5dcbf2e86e0f2ba9d106aec034ebc8b72cd7e5855ca-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dc2eee02-a440-41e9-b0c9-2a82330fd3cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw0cff7dbb7900608e7ba330e78ff4085e-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e979068c-ca89-4e90-93a7-81354e10ba37 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwc76e32cd40d07f5b8876fec6b9975fec-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ce2c7c9-91fc-4b13-8c99-0719654303e2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-e47829857ffa5c0e8ea8b133af3d79374713131054bc-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a599a370-404a-496b-b256-4ad8f496dca2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiweab742ba4d27088856f8fbb69132a013-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7fbb0cd0-11fa-49e5-b6c6-515d380d553f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-e47829857ffad5dcbf2e86e086be817a282bdc9698fd549518f68208-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=418e6308-c8eb-457f-b011-26cc867bb049 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custome47829857ffad6f17e026aa103b9fe9c23073ceffea1c-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d326e1df-636b-4950-b1ff-a593bdeb4604 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custe47829857ffad5d51637041b0e5057683ecb84da0b3fa6e-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b93eb6da-ff57-4bc8-bb4a-3feaae27fd02 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwd584e99df4fd4da1f97a53659121558d-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1bc9590a-0120-43b3-bdd7-3746ba4b3868 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-e47829857ffaefe426c5ca9c34dd85ec5c0b9b73295b-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=83b2f4d7-b310-4d04-a46a-4ca2e899bb44 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:52:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cuse47829857ffad5dc9fa8b8e3277973912fce78b9f3462495-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bfc33880-e17b-457b-bd62-3069e0c8b09d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:53:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-init-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c5cba084-0482-494f-985a-29d3e211aa29 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:53:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c061adf67dfafc9d912cd130a26065efe357da862c45db61faf-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a475c4f5-6301-4048-ab9d-c68e49745e72 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T17:53:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-build-container-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f337a3b8-671c-400a-8944-5981b7826e41 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=720f4f15-077c-416f-85e7-c77be6179071"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw624740a851800b60f7feb47eb7f4c708-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3ba3c519-6582-4a74-98c8-17c2cce3bd9b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-061adf67dfafc9d9123d5dd3e2cde78cc2b1a6e87d480529116c5b93-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=65c89cf7-42a4-4459-bcc5-722b7d60a309 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-clair-scan-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=84ad969d-0d5c-41bc-b72e-31524514f521 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw291fd218103a9635d18901986c5ad46f-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5c5dd220-f276-48d8-a2e9-8e43a68d271d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-sast-snyk-check-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=17c3976e-7e47-432f-83b1-a8cce898f67b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-clamav-scan-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=667a420e-b4d3-4c80-8cad-5d7ffc1ef1e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-061adf67dfafc9d9123d5dd3d1bc6c556708d16c9059dce43e1b5104-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e12e3c71-dac0-4ee7-9bfb-7bd91818e193 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-sast-shell-check-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4934222f-16b2-48dc-a694-020711f5e277 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiw79cb964777a9b9d931ecc984ecc876f2-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=974d93fc-b7bf-40f8-bc73-dd348c511a7d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-apply-tags-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=16972600-7240-4c88-8f04-683ea044fb03 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwq-on-push-z6zht-push-dockerfile-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69b2b7d8-cba2-42a2-9a45-246463cfb0c7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:02:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-aejiwd4bdacd7e5ec6cc26c2c19311590c2f1-pod namespace=build-e2e-xefy operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fb3b3b17-4b09-4779-acca-c280abfd4488 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:06:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-rlgd namespace=build-e2e-rlgd operation=CREATE policy=deny-virtual-domain resource=build-e2e-rlgd/Namespace/build-e2e-rlgd resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=d564d454-b58d-4289-9057-219ef88df2ec user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=08d51ea5a12e170b94a64b75281c7f5ead0c5d3b010132384bb3d1f9640c9a72"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-11T18:07:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-pull-request-vj5m8-init-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8ad513d5-9350-4376-b494-d0e30b0e027f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:07:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c5b5bede432e60e12332ffe02f2ef141aa16ef83f33ca331b25-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ce1789c-db20-48d1-9bfe-f67b4fa9507b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:07:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5b5bede432e6c5fe31b82fac11b28cddc15842648dbe-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6707f8b8-d5a8-4b39-9858-ce289b500650 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:16:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo5b5bede432e60e76c294288b0a01e0b258fc46593af2ae-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=961e01b9-5c8e-4198-9015-1057206edb6d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5b5bede432e60e1233dd1971e24e53fe0eef5eb884ea9d50482548ed-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=86484439-b4a4-4d69-b930-82c3b58d3df6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhbe059cf420542a8b93035304b372af3d-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4fb28fae-94de-45cd-ad52-748279502087 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh23a4c86fdec699e001642c7685a5e19d-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0e34b5ea-8196-494f-825c-1cfaf7151105 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5b5bede432e6afe97b9ce5cff192d72d4585e14a122a-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=184df091-fd4c-48b6-8354-c00c7f09ec89 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh226a41e1e66e7bb54f8f2065296153f3-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7ac5193a-b093-497e-96c5-c836b19043cf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5b5bede432e60e1233dd197163fa60951c6b3fd7b60a55d74a168523-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f4e5e28-1c08-4be4-9c1d-9653127b2fb4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom5b5bede432e60c7b37047c1d69810b4c4a6a6810e05bf-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f2622879-096a-4097-911f-9a90cbe10760 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust5b5bede432e60e133479f2ce61cade62b37ff4f8c2f3d41-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d7310a4e-22f9-49a0-9cbf-c243075aeb45 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhdb011ab12d3638dc9a522d92415c64e1-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=81bcf42c-779f-43e0-a648-2002791848cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5b5bede432e604261573d50c891f0bc4d7b387ab4847-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebe10b20-606b-4fce-9a1d-d4e58e467932 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus5b5bede432e60e1232eb1fe6689a7a41ec974e56a927d03f-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5eee851b-3e8a-4147-86a2-ac4e68f04a7a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:17:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-pull-request-g629s-init-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dfb3cf23-1aaf-4c47-a575-2ffe35fb69a0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:18:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c0f0639822f7a0973def3e639e90ee51a38b9d67f0a483f19ef-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1d9dcc11-aff7-4652-9bd0-d9dbceedd731 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:18:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-0f0639822f7a22f16bd37b5cd35deb207b4b89ecab4c-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0edb681f-190f-449e-939f-ea97ce62c368 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo0f0639822f7a094cd630131e7370c5aa1100adf3b717c0-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a24c85e8-d9a9-4222-a556-b92122ea446c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-0f0639822f7a0973de5b41e934758e6ea27f4254ec0cd32d54f3db19-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cf3edb1c-8f1f-4e5f-87f1-0b2b995b395c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhc2233942e74b1c408dc09758a46a70c7-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1a261908-3224-41e1-a246-307c925ebd62 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh1b1e147127fe39f1d77318ec4e8a0174-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=873a24f9-909e-49c4-aa39-f97e7dbaef27 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-0f0639822f7a1fa1ce1019d0ea552a20d8d07cc8dc1b-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f80e70d-6be1-4e19-bee1-e22e0d6ed232 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh4f121e66a51f56ca1fe95e2ed65c0f3d-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=605c55de-5528-4d37-bac7-3d64738537f4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-0f0639822f7a0973de5b41e999bba54644561d05f5b4a4e4e493e572-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ed9a6912-b532-4536-90da-39b729d99fc2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom0f0639822f7a0792656d8805adcd760388c50d37d32d1-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5f133946-4ded-4c3b-97ef-206c612e3dfb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust0f0639822f7a0973721d1daa356db89460e6317aa751be7-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eb180023-4bcb-4a50-a23c-a640ab47f942 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhc30ea622e9c3c8a23a4981b795c1619d-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9826e850-56ed-4bc3-91be-2f45430a26a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-0f0639822f7af66ad972e9ec78bede76de6391e4c053-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=24af3453-310e-48e3-a86c-c3f1b4a3891f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:27:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus0f0639822f7a0973ab8c028cc6c21b98147fc67c68d86516-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ceb8d41c-227e-4d9c-8c67-17c80078aadf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:28:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-pull-request-2kvg9-init-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a9736fa-5073-458a-b4e2-157ebadadf66 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:28:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c4f5e0da527fb1546b346389a4caf8cd5c616c4738f0bad9242-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c2818537-ce78-400f-b894-60308dec7c6e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:29:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-4f5e0da527fb719c56a69313477971ef14b1e174a632-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ded94949-239d-4b7b-92cd-639f0f561cae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo4f5e0da527fb153fd79233c1dfd191a18b30bf2fb1d4ce-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=99b6c254-5dec-4292-abde-9a69cb9d9545 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-4f5e0da527fb1546b3d09150740c1c07c843b13a4aa81b1c0ad6e661-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=38bc8b8d-0796-4794-a81f-6ef812b8774c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh7d31635af6d69e8d209c4964cc128a6c-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b79841bf-ab4d-4346-9fd9-4aedbcf845a6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhb618d998f03d9bd7e5558f134800ab5d-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=09dde1de-9db3-466a-957c-e2d71e12698d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-4f5e0da527fbdc9c3facd7391cd1e19a80c1049da6b4-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea5f509f-eb67-4cb0-a9f2-2b22f3cb5d42 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjh7540bbb01278ef6e00429cddba2a37c1-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0d444ac6-a5e6-4a7e-a8d8-7e2c15a75dff user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-4f5e0da527fb1546b3d091506e2bc005fcc6353c7a190932511edd0a-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1b597a3d-6d8f-4ddb-ab2f-975bc8fb7b00 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom4f5e0da527fb1a65faa0b6e43c216ce1f68cbd185f52b-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=83600173-bd29-42dc-88c0-0412eea60cdd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust4f5e0da527fb15487df10563fe3927c11e29e7cb6b76f99-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6e07c3cf-83ee-4d6d-ac12-515eb67cbbab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjha17d58f3fc439152b535d6cdb1129d89-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=52b46122-da51-4c62-84c1-ec721ec3f4cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-4f5e0da527fb65e928adc4c651de0ee66466f0ed7b38-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e264b7e4-75ad-4fde-a9e4-a1c579855041 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:38:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus4f5e0da527fb15464c29ef4007512859afa00bd522edb62c-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fec241f2-956d-4f56-b8d0-1a6eb9d79006 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:39:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-init-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64f84507-88af-427b-a845-3a81ba554520 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:39:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c7fde37fa970e6e2b555bb3ecc830062db05ac43347c18e7c10-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=60dd769d-a30e-48b2-ada1-1eee04fc015e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:39:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-build-container-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7d44ac2a-a355-4a9f-aea9-89f620544dcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhd1ce4c273cee8557c7a1215b07b7a1e3-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=005eea2f-b109-48f6-ba48-9d376e47c84a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-7fde37fa970e6e2b556c15f09af71680ef67e346f5583085bbbe04df-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=22c9eecb-408c-45cd-8226-6e590cbbfee6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-clair-scan-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e4259ad2-9afb-4b5e-a859-6d7cacc44b41 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhe9e9e12aba23c7704c2326e011626284-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f505a8ad-1d90-48df-a76f-17902aa8705e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-sast-snyk-check-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4b7d1951-d7e9-4c2e-b2e7-9ee9c6b32f7a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-clamav-scan-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a3f145bf-179d-4c63-8f32-47d6794e498e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-7fde37fa970e6e2b556c15f07f6e98b202640f2515d1dc6993c2bc87-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5039865-2b4c-4a4a-9e0a-8391bdb808bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-sast-shell-check-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=acba140a-236a-4ca1-9d6a-be13d815039c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhfcc4a0972632bf34757c6b98e88bd31a-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cb18b6cc-e0dc-4390-a701-60050f01578c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-apply-tags-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6fa34726-326c-426b-962c-5369ed5ca754 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhl-on-push-mxzsn-push-dockerfile-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6ba63d16-dd87-4c1a-b17a-4487957fde65 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-11T18:48:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-zuhjhd72188f36cb7e4cdf82f32ea1f7bb736-pod namespace=build-e2e-rlgd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e07fe0f7-1028-4bec-9d89-34f66208a920 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=7c66e882-3c0b-4676-92c6-60acf3bd5ec4"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["6f0cf7d4-7e92-47ff-931a-02647e961062"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-5bxvr"],"authentication.kubernetes.io/pod-uid":["2ae0c2bf-289e-420d-8122-30faba6e4cca"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c23008eb-acab-47ab-983a-962ec95e93ce","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2