2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=0fe91382401630df2c26c5525dd9eb9c0df1b0ef logger=setup/version v=2 version=v1.17.1 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-03-24T17:03:56Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:415 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:431 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:440 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:445 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:453 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:461 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:477 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:491 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:505 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:511 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:525 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:546 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/pkg/config/config.go:561 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-24T17:03:56Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-24T17:03:56Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-03-24T17:03:57Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-03-24T17:03:57Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-03-24T17:03:57Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-58c9d79bd8-c974k logger=setup/leader-election v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-03-24T17:03:57Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-03-24T17:03:57Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-03-24T17:03:58Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-24T17:03:58Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-24T17:03:58Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-03-24T17:03:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-03-24T17:04:00Z INF github.com/kyverno/kyverno/pkg/logging/log.go:180 > 2026/03/24 17:04:00 http: TLS handshake error from 10.244.0.1:49414: secret "kyverno-svc.kyverno.svc.kyverno-tls-pair" not found logger=webhooks/server v=0 2026-03-24T17:04:07Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=6b4da43a-835b-4faf-97de-7a4243de3e48 v=2 2026-03-24T17:04:07Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-03-24T17:04:07Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=f88811d4-b2ad-4d51-bb93-e96fc5a5e4d1 v=2 2026-03-24T17:04:07Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-03-24T17:05:03Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=a1c96444-f3d9-43ff-9a73-5b54a6e037ef v=2 2026-03-24T17:05:03Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-03-24T17:05:05Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=16262ffb-04fd-414e-9f16-aceaf438e5f1 v=2 2026-03-24T17:05:05Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-03-24T17:05:05Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:256 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-03-24T17:07:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=6ec6d895-db4a-4ecb-8bce-1d8686cf25ed user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a5f4d1b51f0b93ce5ed95e50b9e7cd2ff68f21c1576dad6efed0013d4af6b670"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-24T17:07:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=e63148e3-935a-4e9e-84e4-86d79839677e user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a5f4d1b51f0b93ce5ed95e50b9e7cd2ff68f21c1576dad6efed0013d4af6b670"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-24T17:14:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-zipw namespace=build-e2e-zipw operation=CREATE policy=deny-virtual-domain resource=build-e2e-zipw/Namespace/build-e2e-zipw resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=f197314e-4e5b-4add-8f3c-25158890e4c2 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a5f4d1b51f0b93ce5ed95e50b9e7cd2ff68f21c1576dad6efed0013d4af6b670"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-24T17:15:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-pull-request-5bb5n-init-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3a548f1b-61f8-4a22-9284-022eae19e65c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:16:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c91b8df7c98a38a5829e5443276590a57f5ed34d9973d273c94-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a2c88cf9-b8d9-4ce8-9de2-4946fbbf668f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:16:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-91b8df7c98a34542e4a751179ea9fa0aab5a12f5c0c7-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5bcbd205-3c28-47f8-9acb-e5a41bdb7950 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:17:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custo91b8df7c98a38a5761f3a7bd056bdd22a0a0524c8324f6-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bf1260a7-98f3-4a9d-be71-df4041fed668 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-91b8df7c98a38a5829a98914af8a771cde2840895aff2503a6b7d7bb-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=74cd8212-740e-4366-b0fa-36f53256d9d6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo2db1c80c48861794efd8ac7931738c4b-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64288f15-f0e6-4b30-b5fa-39d6ff54f6b4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo44f0feb5c5483d850f267961fefdcc26-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=486fe59b-ab9c-451e-9c22-7fa65d5d0afe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-91b8df7c98a3f5c398ddd27f977c2963d06515955aec-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=52cf8d3c-34b1-41e0-8da5-916f9c2adcfd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo9c8015a5edc349eaf88830f41d467f85-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=41cf6a2f-3a9f-440a-9289-1ef5375f8fff user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-91b8df7c98a38a5829a98914a816c830c5b92b21ec2d81f6e8cf8f8a-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b78100cb-22b5-4e3c-b9c6-5056173446d3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom91b8df7c98a387a2edf90cc3f616a59bf0ce8f6b4cc4b-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1b7f17d-980f-465b-a6f4-6795f2477710 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cust91b8df7c98a38a552ebc56e6c09da911d4a5a71d4b00b29-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=17c834c8-18fd-44a6-90d8-d1e44192e763 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxoda332388f16b5e1b140beb05304e7072-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=110f0651-aff4-4639-9cf0-e1ceba7696ad user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-91b8df7c98a3c63694534a5d7097a16e8423f9780ecf-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=36af7c8a-8beb-4de9-9ef1-6d37fcbaaa85 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:18:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cus91b8df7c98a38a58914d78754357a501d5ded41cec3557f1-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=509e8724-4cc2-4d4d-aa52-0d32112ce59e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:23:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-pull-request-tnh79-init-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7d99afcf-dd13-4ca4-93e4-8eb5a2261cd5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:23:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cae94d58830a820cb89794b1047fa1869c35439e95591bab1c8-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4abf9e7-04e9-4277-aea8-c4541df315c7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:23:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-ae94d58830a8363bd08028bc2b4bdba9fcb1b6386111-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80689ae0-a1db-47ba-89ef-da49c996c28a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custoae94d58830a8202894de83ab7ddf2692e9c404d78eede1-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ec131b8b-8088-41f6-8cc4-83f7a4ddac5d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-ae94d58830a820cb899f3dc14ca4aa7efd9953f679c440af5a9025fc-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cd9f8fbb-a9ef-481a-a28c-1e3de0d12108 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxoe1247d39e8323a1cf879fc37c4a1cc03-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0aa83a5a-8344-49a9-8551-4457845e00d5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo367d2b04c0d4a787eb0766b7e47c8ec1-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c99da5e6-8c2e-4ef1-bc12-6954d411e048 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-ae94d58830a82aacbca1e9cb0eb3129a7063880c9325-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c044d524-d50e-4b7c-8722-052fc18eb8e6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxod875c34116850ddf86b2483589b5c470-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e9311e9a-a3e1-4bf4-a79c-394b9d9c473c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-ae94d58830a820cb899f3dc1ea6491f617338eacde18d6e5be3c49be-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b33b1ac5-dc91-4b7d-a63f-4dfb0e782229 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-customae94d58830a82df0032580c1cc1531c4ff9e65dbb2eb5-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b85fae34-2f82-44f6-8d8e-a7f841ce1b5e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custae94d58830a820c306975905000c1ae80f838e2b184bc54-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=961142bf-c93b-453e-803c-afe8f0a80138 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo9aa6667d010b6ff11c3bb65b919d19aa-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=26e9440b-6311-4113-978c-8b3c22825095 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-ae94d58830a86f50f2503d34dfcd0978a474b3d456c6-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=13650603-2eef-4bf4-8f84-91dc38eb4d18 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:24:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cusae94d58830a820cb335507063e5d80a75ac5137c547b9949-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e96e396c-8270-4d85-a9ce-ebb596f87736 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:25:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-init-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a096cac8-34fc-4b97-b5e6-650b5dee75e2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:25:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c30e065f8de9ab234173cfbcdc02ad2806f72ffcb46ffc6e757-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=efb98a81-1e60-40ab-adb0-f4a6824af8a8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:25:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-build-container-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=28f12bca-6b30-402c-bdbe-8f1ce9f69976 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxof1c389820ca21c7a60b1dfd5f35a36b4-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1267acb-4042-421e-834e-49e0be25245e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-30e065f8de9ab234171a7c4f5ed261ce33d2608f22f18000cd7849b3-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b093ab8b-d286-4aae-92d0-b72d1cb61dc2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-clair-scan-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=86d38ee6-9d1b-4868-af59-2f86f0d25116 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo164c4408055980a173e214a108a6b626-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6aa8f4d0-9271-4011-80bd-85a5a0d94fdc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-sast-snyk-check-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1217722a-7356-4629-9e72-442fc3d44ba0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-clamav-scan-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=813138e6-70f9-461b-82ac-e64ffd814c0a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-30e065f8de9ab234171a7c4f393ad8a55cd4cea1d8da66b66f58a7bb-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=76512652-85fa-4bfe-8c41-e908f87f1a7d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-sast-shell-check-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eae6fe62-30be-40bc-84cb-675fccd69217 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxof55a6f2df43b77075bb556293ad607ff-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5a49e9b-c5f7-47dc-bc82-cc73e6e3362c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-apply-tags-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3e46e28b-e849-48a3-9368-15754348d9f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxok-on-push-7zjlb-push-dockerfile-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=63531886-e280-4b27-861e-64dbf1adfa1e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:26:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-evlxo7ac6061bcc03c853cf8be90672f418c2-pod namespace=build-e2e-zipw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bd841614-8caa-4d25-9c66-bf7703c8c90d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:30:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-ugxm namespace=build-e2e-ugxm operation=CREATE policy=deny-virtual-domain resource=build-e2e-ugxm/Namespace/build-e2e-ugxm resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=971cbb5d-67cf-432b-83ff-7542b4eb3d61 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a5f4d1b51f0b93ce5ed95e50b9e7cd2ff68f21c1576dad6efed0013d4af6b670"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-24T17:31:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-default-zxjjmj-on-pull-request-6lhcm-init-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f4ffcf41-e9fd-4375-89c3-8c6ba494c6ff user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:32:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-pull-request-9p2g8-init-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bcbef38c-5a30-4d60-ba01-e973fff97e79 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:32:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c76dd8a38748787a365839865b152a1bd0b4542db7c53a79607-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b339565e-2809-4d49-9742-51a82c77a57c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:32:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-76dd8a38748788fa791c180fbab01af64ad7666501ed-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=528deaeb-5121-4c53-9c1d-ef59a21239cf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo76dd8a38748787a402e3f78e3cfb934e93cf68a49b57ce-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ff97343e-c3c2-4c86-98ad-f484f6380337 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-76dd8a38748787a365857c85e059ece2c8fd63943cf2c89e5a438683-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=232325fa-5668-4b45-865b-ee17387afb17 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu65143ab72fd7c92e1fba30b667b7ebbe-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b82b2bb3-2ad0-44be-92ee-f1c7d6e8d862 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu132547cd21017acb56704b3f0cae0bed-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1563d870-ee37-4d0c-9b0c-fcb3426906d5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-76dd8a387487eca1abaebffd5a709f303adc446fe4b0-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=32c3cacb-3432-4752-a88a-4578229602ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu472a8a239cf84e9216c1bdf7547df011-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=989b8b44-8374-457f-ba8f-ceea7848e45b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-76dd8a38748787a365857c85c443937a0c2afbeef0d5c62b6e7572f8-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7b80768a-8a94-4e63-99f0-e53d8d0535dd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom76dd8a3874878967795de956e66517063371d4a101e4a-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=39a9b667-f702-4619-bdba-5d90e005eb43 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust76dd8a38748787abf6abe60c8fbbc8ac6e3d54c1d8d0bb9-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8d87b3fb-7466-4013-8afe-c096640d83ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu09a424da2ba26e79372e36b326c38faf-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=af40ec3c-3c89-416f-962c-293128dd8f7b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-76dd8a387487627695bd410c0f6f20465861650f410f-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2526a4cb-10d2-467b-a7b7-7f14eec00914 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:33:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus76dd8a38748787a3ac1e42f4fcf39a1ed690b1c290abf602-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=25928e46-3f86-4155-b820-7158e6668a6a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:34:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-pull-request-2nhkz-init-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8475964e-4e3c-400c-b4cf-a30b70987f95 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:34:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c5e79ecec754cee9bc3653285bd849cf88c03e22bceefd0f376-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c9101cfb-4101-4e74-bfae-868886f9dac2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:34:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5e79ecec754c3d40e390f076bfebdde018eeb4c3a225-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3394a267-ba69-4698-b060-1433f00185c3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo5e79ecec754cee2c8d6d7244fd9c4e5e9a82e41cb4e6a2-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b06b0685-0a82-474c-b70a-56a0ec5c4bf9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5e79ecec754cee9bc3096ad452fba944247b33324b55cf282513c02b-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d42c63fb-0c25-4ec6-b823-061f0202a2af user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu217a849ff6c4f7b59492a417c3f853c8-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cc0a2dcb-f776-4120-a60d-63ef2407ada5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciubafbbcab392f6b17eaed1c1d7c3bc80e-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b1457c9c-3719-4b2c-a446-2f572ef99b54 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5e79ecec754c892a5edac3085ad47f9dfea081579c92-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8e3baada-3d54-470e-ab9d-14f70fa13176 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu23217586abba2355d440a76a9807b117-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=343ed1e8-2331-4075-8ba9-9434b442b0e5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-5e79ecec754cee9bc3096ad494f139c1bbd181a5d7cb21f1abe4fc11-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=50837664-dd4b-4e24-b64f-29b24473102f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom5e79ecec754ced46eb0202469ac99bac2d59425d7f7cd-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae4fe531-9786-4e13-a4bc-e0554c75177d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:35:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust5e79ecec754cee9869a8ba70c6b1f2b43922d77d420be49-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=392066a1-ca6c-462b-bbdf-664adb3a77d7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:36:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciua21d3c9f9e8183fd264dbcd5b757d194-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c34d2c3-b38f-4b6b-83de-5826ee781900 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:36:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-5e79ecec754cb494e5a616d037e2c0e90a3f05a50917-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b64ff047-a6f9-4c22-984d-9d58271e8f32 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:36:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus5e79ecec754cee9bd2799933b804ffe4b24662669c3f3185-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a48d03b3-c3a0-4569-886a-5a4b7ee2d097 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:37:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-init-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18f89ea1-118c-4f78-9ffb-635123164424 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:37:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c888432721541f48214d24de04c1f4b4bf77972c22da93c0c4b-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c4098af-49b6-42f3-96f0-e1a100adf337 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:37:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-build-container-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=de6723d4-be68-4118-81cd-0987035b5e36 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciud299ba4a15b10ad8ff6562a1b9795b6f-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=68351acc-e881-4f26-ab0e-79d8ea13b139 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-888432721541f48214c01775ea4eaeb3372ab33410d33b167d655608-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8dc79b67-a49a-42bc-ad25-6fdea921999a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-clair-scan-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7ccffecd-00cf-454a-a5e0-0768febc9819 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu51629f821bed3b2408b5f940060856dc-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa3f56b4-6a1a-4eb4-9b3a-fbf43d353baf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-sast-snyk-check-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5a8a4220-c691-459a-832a-a7d213fad63d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-clamav-scan-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1b1a5037-a656-42c3-b31a-25f68ee49b5a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-888432721541f48214c01775bf173124534e24cb2add215c57d402e2-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f12c5317-260c-45c0-ac17-ef15f1fd4808 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-sast-shell-check-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cb6322bc-af2a-41ce-9b97-ee61c702d7e6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciu2936e1d013164ad4ced094973875b0e0-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9a64e935-d2dd-4d3f-af13-85391a88b744 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-apply-tags-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b3e9490b-379b-438b-945f-7c251aee06b1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciuy-on-push-m8n6t-push-dockerfile-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2f21686-cf55-43da-83f4-5bd9c54ae893 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-24T17:38:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-whciub0d2f9b1bd7b67060a2f7269ba7d0e9d-pod namespace=build-e2e-ugxm operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2245f710-b8cf-4515-af4f-a399d6dfce34 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=896c57d0-3cd2-4cb5-9ce7-eb573e20ea76"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["bcd48762-0e78-42f4-9dab-a1424c312eda"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-7pgqb"],"authentication.kubernetes.io/pod-uid":["de7a07d9-9610-45b3-b72c-f9597b1efaf0"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"0574aaba-4759-4832-ad11-1de59b1b9358","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2