2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=0fe91382401630df2c26c5525dd9eb9c0df1b0ef logger=setup/version v=2 version=v1.17.1 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-03-18T10:12:22Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:415 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:431 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:440 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:445 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:453 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:461 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:477 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:491 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:505 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:511 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:525 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:546 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/pkg/config/config.go:561 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-18T10:12:22Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-18T10:12:22Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-03-18T10:12:23Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-03-18T10:12:23Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-03-18T10:12:23Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-58c9d79bd8-b8d58 logger=setup/leader-election v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-03-18T10:12:23Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-03-18T10:12:23Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-03-18T10:12:28Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=0f3d3573-4ff4-4840-82a9-df85263043cb v=2 2026-03-18T10:12:28Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-03-18T10:12:29Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=1d583ef9-5f52-479a-8e4d-34ba90baf55c v=2 2026-03-18T10:12:29Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-03-18T10:13:21Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=fc4398c3-62f7-4af4-84aa-1986ded21e8a v=2 2026-03-18T10:13:21Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-03-18T10:13:23Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=108959ab-4297-4310-80fe-5c7feeb40f58 v=2 2026-03-18T10:13:23Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-03-18T10:13:23Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:256 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-03-18T10:15:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=b2b8db33-b2a8-4951-b7bd-f89da5c53904 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=c3e8d10f043a2ea85b7d9cc63460027b4a0e78488d1579b1a0c6b410ea18be34"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-18T10:15:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=514fdf05-13da-4c0d-9230-5a083087a539 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=c3e8d10f043a2ea85b7d9cc63460027b4a0e78488d1579b1a0c6b410ea18be34"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-18T10:22:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-diir namespace=build-e2e-diir operation=CREATE policy=deny-virtual-domain resource=build-e2e-diir/Namespace/build-e2e-diir resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=aaba28c0-439f-4b89-9214-f0a67b4485f9 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=c3e8d10f043a2ea85b7d9cc63460027b4a0e78488d1579b1a0c6b410ea18be34"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-18T10:23:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-default-bgveoo-on-pull-request-lqv48-init-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2f052bab-2cd2-40a4-bd29-f5c5fe779782 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:24:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-pull-request-jqmcr-init-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=14e1329d-2a86-458c-bc64-b77072cef79d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:24:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c508a65b388f2945935626f881327a7c17dd61072421bfbe697-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eddfdefb-eeb4-4846-86a3-6e5fd4dc40b0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:24:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-508a65b388f2643d146cd73c1a2d0930f2ac2014120f-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d736436b-1198-4313-8cc1-9c3014166ce5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo508a65b388f294eb07079ef87a0c44636a8bf775e74e0e-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eec34e88-5ba0-4aa4-bfa6-4dc0b66b63be user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-508a65b388f29459354d5a50f2453c4579a0245dfc934775f298ef0a-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=30d7e32f-061e-4b43-b889-134141615735 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomad660173edf6021ea440393aa3fbe19a7-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b7dc0172-13db-4f3d-b2fa-94100d006f9e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomaa44b9e20f1e992c7d062c9e148918d4b-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=115a1587-5319-46d8-9289-cace98e2244e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-508a65b388f2db3e3d6413237714c081267cc10a7566-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44bf3b0e-93ed-49c9-afc0-c0b646bfbb8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma20627fa2c0854543f6fc71f8145340f4-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eee58843-7c2d-4f0f-80d9-8b6fe651d242 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-508a65b388f29459354d5a5047e3ae98c6a28d9a60108f7add26a306-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6f8d1133-f700-44df-b3d2-9bbc4d9441e8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom508a65b388f29c89382b8cb45147e43130c1dfd36c902-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b64847dd-8a5d-4066-b943-dcba414ee247 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust508a65b388f2945a3192fd392c54ea9da789df4feff70e4-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c5865302-a749-4624-b642-10cc05bd96dd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma164744e1cd1fae21eae1a772be4150d7-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3970011c-fe84-4ff6-ac7f-9f52d53b8b7e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-508a65b388f29f5b3743baecce3680ef40d8a05dc1f5-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2044010f-0eb8-493d-af70-8447b7e715db user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:25:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus508a65b388f294595b817fb13935f414ae3fcc830a0c8a8e-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebb760c4-d143-4f2e-8da0-2d642ebabba1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:26:33Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-03-18T10:26:33Z ERR k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-03-18T10:27:12Z ERR k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-03-18T10:27:13Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-03-18T10:30:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-pull-request-wrt9h-init-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=84cbbaac-9915-4304-aef6-86b5e1f7375f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c5414c37ad03c166e517f008b09b93c77b6e1a979c907e586fe-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b15f6331-c30b-467e-bd60-d2cbe0d37e01 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5414c37ad03ce97d4da47cb78738bfb6a11692419d68-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d324de20-7b5f-467f-90d5-5b416dfeefce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo5414c37ad03c166433828c9b572775441db935af05d429-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=83c2d1c9-54b6-450e-bb30-3d3c6952757d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5414c37ad03c166e51e7809fa675da606c9e017774c2baaafe31156c-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa8c1bb7-7075-436a-a0cf-639d13c70b24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomaee89851bd40790aa03beb6b045ff89c5-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c16cd0ed-9426-4452-b6ca-4b14c7c1e7b5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma50a6d29ce7529b8f9592504920766ecc-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cfbb3924-26ef-4b6a-b1e3-2179ed6dfe0f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5414c37ad03c5b49a15a243cdddfa503c82b6ffca81d-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=728cf766-3252-42fb-a6b4-bad29ac38569 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5414c37ad03c166e51e7809f8d3b1eefba59811eb24c4d5a49d8b3b2-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=984a9681-14af-4437-9801-20eb0efb9a5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma374fb7f8f4aff6cfbd19d9b0369ac1e9-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a6d49ab0-f444-4f00-9bfd-5b5c19f13e83 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom5414c37ad03c1cc9015227ee62f966348d0d20db5414c-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c3668d1e-8552-4f7d-9ef4-ecc954fdb855 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust5414c37ad03c166c732f6eb3fc5e10fd63961530b497908-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9231b061-8a5a-414d-8b5f-78ce29afa166 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma3a47ba134de4987fdd115d26f208db39-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=152d98c3-a890-4f9a-932c-bf860d607e93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5414c37ad03c3e9bfd361c18392d4d60d688b9935ea0-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=827aa3c4-26ef-49fb-b922-8422f129b758 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:31:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus5414c37ad03c166eeec0bc84b02cbe5f742577cd90c8d2d7-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1bfea77c-2129-42ed-8f1a-84f9ee247922 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:32:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-init-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0ed22b87-c561-42ac-b168-2be11f77872c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:32:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c15396251e5a1dad576a0d80595f0acbadc8583fa996be411ab-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ce197b5f-a55f-430f-8450-98f5e77baf5f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:32:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-build-container-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b977f249-466d-4350-849a-adb76e96ad2c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma0a440b9fc162abfa69574a63808393c5-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ec4c8cca-c664-43dc-8749-2db6653c713b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-15396251e5a1dad576ccd19b9e3efb6d679ed3c9404caa85bea71520-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1c57e01f-47ad-4c22-b7f6-2fe915d8585d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-clair-scan-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f6725183-c342-45ff-b615-09ebaf7f6d9e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomafe4f9dcfaaecb989321c8fa426bc6aae-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4238ec1-af08-4d3e-8eca-206ecbe64454 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-sast-snyk-check-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=62efd3f2-d0ab-40b6-a054-f6d2f64cb3bd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-clamav-scan-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=15c2883f-adad-4f2c-8997-f46bd0f6cd13 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-15396251e5a1dad576ccd19baec9eeb78c745ae3a350b44c72975fa5-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2b877e77-b1d8-4f95-a5f6-7e84776c924e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-sast-shell-check-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e8af047d-f488-4ec4-af94-f014d405c16b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomaae6e8575b5f3f90d6a91ffdeecb6f164-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bc34e297-0fe3-47db-a15b-5bfac2b10c53 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-apply-tags-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bc996510-1881-4f97-af53-c831783a349c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecomax-on-push-m4fj6-push-dockerfile-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=be833bc6-ad7e-4794-8240-9563c61baea2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:33:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-ecoma9724e3714739eac1d8feebf0f9189dbb-pod namespace=build-e2e-diir operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=715f60ec-04b7-4c62-8d4b-c625af1ef804 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:37:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-bnga namespace=build-e2e-bnga operation=CREATE policy=deny-virtual-domain resource=build-e2e-bnga/Namespace/build-e2e-bnga resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=180554c5-b88c-4f7e-b5c8-77c6c114280b user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=c3e8d10f043a2ea85b7d9cc63460027b4a0e78488d1579b1a0c6b410ea18be34"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-18T10:37:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-default-lonzdd-on-pull-request-ln92l-init-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7ed292bb-d990-4deb-bb02-9cedf09faeda user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:38:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-pull-request-zcs7q-init-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=84002fea-d2bd-41f0-b45b-cc9ccc04be96 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:38:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-ca0e8d08d7eb7a087b435be1c54b6890f3ccef649c10b1d6d77-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=db45d966-1738-4917-8061-4ad71c858c53 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:38:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-a0e8d08d7eb73fb6faf5a246f8429972e8acde38a198-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4570e12b-47ec-4ab8-a943-666bc8168fe5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custoa0e8d08d7eb7a0e548ca7ea2b3882e145c8e75e6645ca7-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=12619c43-ebbc-45a3-acc6-33466588cef2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-a0e8d08d7eb7a087b425d3d09908546ee5b66be3780361c2940aeb0a-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bca83cc-f6a0-46c9-9e54-f86d15d071e2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx64b05a58e1ccc248e3be5ccb9b515177-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e8a8c456-9c51-41d1-86b3-5cf3b5be8dcb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx094d36415888f9a5b69b990dcf1b849d-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5e12abc1-866b-41f8-94b4-3bcd9f57cb1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-a0e8d08d7eb755f780ec648cd25467bdd070250b42a0-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a91c757a-54ac-4b66-bf43-8176fc0b535a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx045466435ad33979e918c87cc0ce02d0-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0ec85c0b-7e38-4f1d-bafc-9bb315df6f91 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-a0e8d08d7eb7a087b425d3d092f53a7c020dc905ce1366be135b48b8-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1cf0cab4-18cf-4a33-98f2-04d5615ef172 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-customa0e8d08d7eb7adb75cd1e0cc6b0038d49b3949f03e39a-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=34f641ff-45af-4319-a50d-0dba3c1b77b7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custa0e8d08d7eb7a085420cba58b16c70cd02fa592ca52d8b6-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a44a5b0-3293-450b-a4ea-a8f5a92cc938 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx8fe3b6ce51d1181971104ec41609c216-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0a7a4b7a-3589-4816-9982-af71a55e0c88 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-a0e8d08d7eb76e082ed6aa21d83f459bdef2932f81c9-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0d5259fc-738a-4dfc-9225-9f3859337867 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:39:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cusa0e8d08d7eb7a0871ca3e4a02321d5bf3a5e310dfa8550ac-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=62fa1cdb-3a4f-47f8-96dc-b0fef4e2589a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:40:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-pull-request-txmph-init-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=53acac60-1264-439d-8dd5-10f9f5eb8772 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:40:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c74efea9b5cde779da177de1b14bff1ea27b6ee6e43ba54cf56-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=90e26d27-1d6a-43ae-a5e0-87d6b0920364 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:40:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-74efea9b5cde89a9822c5bccd8e534193412e845ead2-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=62cdba05-ee2a-4a58-889a-1114548a3d0f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custo74efea9b5cde77262e7a659dffc04b29333b28bf6c978b-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=19282723-b0ab-481a-9dbb-e9ec4e501015 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-74efea9b5cde779da174d7634906c867a121f79899a9aef4d75e9aaf-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78f8c91e-c309-47e3-a896-bd2e591f2a6f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxa3d6b450144f5b29e705b20be8ec5640-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c8f58f1b-b9cd-4f15-a0d3-afb5b1df0f8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxd2a216185bfe6c7f24c8688ab66ccb98-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d533c5a9-aeb7-4267-a49b-6d3a4ed451fb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-74efea9b5cde1be37fa9de532dfea58930cb367bcca6-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=be796978-c527-4006-b595-ac769e72afcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx8ad4617876af45a86e6faf6b195c7d72-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a12f208c-e033-415c-a368-e96a33db6c6f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-74efea9b5cde779da174d7631ad4e3282ef7660403f8656b10a85a8b-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=31aee0d4-ca3a-458a-b371-88b7c2c9228a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom74efea9b5cde7cd214f28d8181e3a98b12852120753ca-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0892f205-8b59-44a4-b3c4-383b03233641 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cust74efea9b5cde779f7f6120e46772211ec761c03365e9e59-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f9ac0138-23a4-4245-8e57-a1c2f5b41e40 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx8b51af9a61a0bf1f98aa0e07d74b3894-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e5c58125-af13-46c1-8e2f-9b72d5d9164a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-74efea9b5cde86762639026c71410b3e4339ebdb1314-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a194b285-2fcb-4497-9bd0-2cc1d914d3cf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:41:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cus74efea9b5cde779d6e90183006c3e318ffb2e44fa4068c23-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ff7f7bb-f697-40b9-9826-b46b282ac296 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:42:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-init-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5a21ce71-5478-4b13-8b77-72c74baa1e68 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:42:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c7d73d32aee36c8ed6f71869a4b5ba1b0c32c72ce22bc6f12d4-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=40d9c963-b0fc-4006-86aa-92d5db17f13d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:42:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-build-container-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=988e6602-d451-40cd-992d-9cddad648473 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx1ff9c99781d8b5becfcb5a1bfdc34dc2-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fecdc7d4-a033-421c-aa1b-e4111355fdd7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-7d73d32aee36c8ed6feeade582645b10ca7a6571aef9d660d794b658-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=90d88228-e40d-4aed-8f96-67fcd7f9a850 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-clair-scan-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3933ba0d-2cfd-4599-ba45-44c512d926ac user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx843300c18ac4bac9e734d40d60033d10-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=750eb52b-cd60-4bca-8622-8d4e272531fa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-sast-snyk-check-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=614f3404-0f78-4f62-8e77-da1cc2d0c92a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-clamav-scan-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=abf06830-cb7e-40a3-b7bb-67d530990626 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-7d73d32aee36c8ed6feeade56bdbd42e79122b47faeb34cfa4efb5cf-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=89663580-0954-4754-8075-baeb62bad801 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-sast-shell-check-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c358be2d-624e-4e6f-a14d-e20a7ac58cab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx3284fecae059e5b263cc42c72034a56a-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b0abf7ba-bc7c-4934-b172-50477e0d0688 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-apply-tags-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6d13c83c-cf19-457a-8cfb-9931609fed0c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-ptdtp-push-dockerfile-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b887b8ea-039b-4b9c-8286-e003430791dd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:43:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxfade846b4293400b92d5cde43824af1c-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=92bed63f-528e-49c1-8e04-29b2cb0cf687 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:44:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-init-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b6012942-fb59-4d80-b8c5-3202d4304b1a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:44:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c93e6fe1deca150310037bed6bb9f220be148cc66bfc800a562-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e2a3caea-c181-4cbe-84ce-8e569fc0e040 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:44:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-build-container-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=95a200ee-b054-464f-914f-223242243f6f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx03d9af4b3ce4786bb1c892b08f092556-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=648280b1-b0d5-495a-9b3b-b55f59fd391c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-93e6fe1deca15031000577f1b89d4c9480fcfa664a71c1f2c8743f4b-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aa7238d8-7358-498f-bf55-71c4ee999a0f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-clair-scan-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ac00949a-d14d-4d0b-82a0-87ac584578de user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxbb5f1aec61929e8d93528a8d72f46aaf-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6b5c4d50-c453-42b7-992c-5cf40777f539 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-sast-snyk-check-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=57837349-b409-4306-96fe-2727c986a785 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-93e6fe1deca15031000577f170c9abe10bc02e503a401c08620696a1-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f19d7a3-58dc-4c88-bf58-92c53d74a585 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-clamav-scan-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c057d092-bbb5-4489-b19f-4af1b2c3b90a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-sast-shell-check-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3fcfea9e-defd-4655-88dd-0c4ae61c5f1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxf82b2a1b39f0667f0f8b37ee20a3d2bb-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c522565f-c731-4bad-84a6-62326ff37142 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-apply-tags-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bd938a3-f7df-42ed-bae6-ec5dc64dfac5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojxw-on-push-gn7db-push-dockerfile-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d753eff3-7b29-4ffe-b72e-d75e6f9799ca user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-18T10:45:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-zoojx244aaf99274c83e01e5864a750c41b5a-pod namespace=build-e2e-bnga operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6a67fc43-4bb9-45ec-ad66-d62c4d8a8f71 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=fdffbad7-0208-4949-949c-58f1f8db41f3"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["51c398bd-c0a0-4fc8-baee-429c69ae769b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-mlxg4"],"authentication.kubernetes.io/pod-uid":["9b28a798-4a6b-4735-af5d-b6514cfeb5ba"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"83ff073c-5775-4c65-86fc-c7734d4a098e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2