2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=0fe91382401630df2c26c5525dd9eb9c0df1b0ef logger=setup/version v=2 version=v1.17.1 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-03-16T14:46:39Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:415 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:431 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:440 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:445 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:453 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:461 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:477 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:491 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:505 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:511 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:525 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:546 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/config/config.go:561 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-03-16T14:46:39Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-16T14:46:39Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-03-16T14:46:39Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-03-16T14:46:39Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-58c9d79bd8-x576h logger=setup/leader-election v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-16T14:46:39Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-03-16T14:46:40Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-03-16T14:46:40Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-16T14:46:40Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-16T14:46:40Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-16T14:46:40Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-03-16T14:46:40Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-03-16T14:46:41Z INF github.com/kyverno/kyverno/pkg/logging/log.go:180 > 2026/03/16 14:46:41 http: TLS handshake error from 10.244.0.1:39178: secret "kyverno-svc.kyverno.svc.kyverno-tls-pair" not found logger=webhooks/server v=0 2026-03-16T14:46:48Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-03-16T14:46:48Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=38176785-5500-4ee6-a66c-107d5eff2be8 v=2 2026-03-16T14:46:48Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-03-16T14:46:48Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=9a699047-2ddd-40a5-bb13-a33247b78181 v=2 2026-03-16T14:47:37Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-03-16T14:47:37Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=bbd7c426-cd6a-48a0-ba19-0de7ddbcbd9c v=2 2026-03-16T14:47:39Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=22bb3d9d-6d0f-4ce8-805c-52a21e7779ac v=2 2026-03-16T14:47:39Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-03-16T14:47:39Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:256 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-03-16T14:49:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=8a2f146e-3cd3-4100-b120-013f4a8351fc user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=976516f91dd9a4c88be3e09a3901569c59d17d86ae3e263d0a433ef55835586e"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-16T14:49:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=dbd1342b-0f0d-48f1-bb51-5c9ba40fb84f user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=976516f91dd9a4c88be3e09a3901569c59d17d86ae3e263d0a433ef55835586e"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-16T14:58:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-zxxi namespace=build-e2e-zxxi operation=CREATE policy=deny-virtual-domain resource=build-e2e-zxxi/Namespace/build-e2e-zxxi resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=e2f5b92f-af98-4fbe-8a41-c00602d865dd user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=976516f91dd9a4c88be3e09a3901569c59d17d86ae3e263d0a433ef55835586e"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-16T14:58:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-default-bfpiwk-on-pull-request-gc64d-init-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=37cbc017-1f24-4503-be91-ef84bca48c75 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T14:59:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-pull-request-l57d8-init-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=949fcdda-271e-4527-9004-d70ee1172086 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T14:59:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c8417b43096540f1e7bc39415d20e88c4e43477d07253d4c6b4-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=60d65863-53cb-46c4-8808-7f35f4c53adc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T14:59:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-8417b4309654630c2b4bdc51e25137af15f03c6c7bca-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9c999aff-c949-44bb-a30f-6b1d02a22963 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo8417b43096540f0972f83e0ee28c6142f2c5c747e6fe40-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f403084-5e12-4a8b-b76d-1c74c62c3369 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-8417b43096540f1e7bdd8f8f143e9a62fcd24c769ad9b0a86eb9c4e5-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d30b499e-801d-4208-84a9-0d0a3cb7a446 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc5a94530b70c61792c979de8612eafaf8-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1a0d9a1f-1026-41d8-85da-4864c66299d1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc9918941d12c7714cab5e568584c1f007-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64121d54-4ba1-4ef2-b18a-e10aaace5c96 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-8417b4309654aefa812d217e76fce67f8d63fb930e94-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9a17b439-54e1-437a-8ef6-9f6381fff9f8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcad92c932102bb58d5881dc5288f3ec16-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7adc8ce8-5aae-4f7a-9581-c3d8a28b4faa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-8417b43096540f1e7bdd8f8f936541d37a8c6d3b8e0f0af9cc534b1f-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4e44d537-2a36-4dc2-a207-f25742a2ce30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom8417b430965403d30f42d057db0ee19b283dfda410bda-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f7f71248-ddd4-4fab-8c9a-323998c9d5e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust8417b43096540f1bf468a6297cb3926a24983b1bd06d487-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8ab123a3-9206-4e8f-ab6e-9c7f22f2f656 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcaa16c8df5c695254fd83451a7af4fef9-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d239b4ca-1c1d-4557-9fe4-0c6aec0477c4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-8417b43096545d3ab6c135d1dc85d9d5667225beee1e-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a8d072c4-afef-418e-af4d-9dd756d9dda9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:01:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus8417b43096540f1e94b14c7a33e6dbc1c85789c1a5ea25ab-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0afd714c-1a89-43b6-baeb-b95ce524302a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:03:32Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-03-16T15:03:43Z ERR k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-03-16T15:03:43Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-03-16T15:05:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-pull-request-6s2zz-init-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e3716a55-7b4b-45a8-b1be-01c4d1e36505 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:06:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cbf338859c3ca8562518dac397f5d33f8a60232fc6f809d9750-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=63ad53a9-3fc3-444b-9e9e-827cf9a2430e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:06:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-bf338859c3ca042420d772db2301118a0d6b00fffdc1-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c50d01d-2b2b-4a1e-9945-2b475a1aeaa0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:06:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custobf338859c3ca8503221caf28a50dd2d2e60572e20a54e4-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e611bb79-00ae-4482-9591-b667939da210 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-bf338859c3ca856251623dba4730483a5516c2484cafa116bf545f9b-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=30d186a1-5992-4652-8a29-3b9196cc17a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc6a7c3b751f96372c5f91c25c1cf12b71-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=30c2e7be-2dd0-4950-b522-3af0bfdef60e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigca610f9e0d2ddcfe346b82aadc9e24564-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cf77880f-e91b-4c48-a2ac-edd0cec0a550 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-bf338859c3cac38919c2d9fcb329411847d892bf9d07-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5e190d00-d8bc-4bee-9bf3-d15dd1bf643b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc6fe6f42fd7096768fcb3dd6e3bf4b2bd-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8c17296b-ee2d-444a-853b-f84bedc25f34 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-bf338859c3ca856251623dbafcb8b13fee6e4a4855ec607df6a0af52-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d7cb3a61-2a10-4342-bf7c-e6af7232486e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custombf338859c3ca8ea2d8dcf7eb4d97ad0a09649efc9288f-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=713d2028-83ed-4744-a686-f8e7c4557399 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custbf338859c3ca8565a35d6df540d890bcae97f61319301b8-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6aeac462-9fb4-41e2-a116-21f33d777566 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc974308065f45227bdb11e650529aa7f5-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=191efe00-30ad-4be1-bd3e-12e557c5868f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-bf338859c3ca8f4900fee11c113ff418666136b72c38-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6275f32e-2c08-47fa-8a98-68e3f1bd96d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:07:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cusbf338859c3ca8562138ff00f388c62a51fa1ad613b7e7ad8-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1cb58bc8-80b0-4e07-819d-460703f97371 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:08:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-init-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69fdbac1-5ce7-421f-94da-54f3b5c41afa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:08:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-ce856ec42dde546ade4ad1ce340a312134485602ea05a184e1b-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=629ab67c-7245-4ec1-babf-27b1cbb72986 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:08:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-build-container-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f0130ef1-8b99-40d9-ada4-1df8b9120488 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcceffec3d3387960823c024e8ccd0e53f-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e99aaaa7-023c-4413-a9cf-78b249c3b939 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-e856ec42dde546ade4c501c1266a9de957abe164ac68bdfb179d132d-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=584a571f-69c4-48d6-8271-5a502f876d38 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-clair-scan-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=326f1283-48a9-4e71-9460-e5b67a7458e8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcf595947118f864f951514075db3a172b-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=88a9f6bd-c84e-484c-b913-e34809f01afe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-sast-snyk-check-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fdd72b50-0f4c-42a2-a643-2bb8758d5d03 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-clamav-scan-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=54d5f6c4-fdde-495d-bfd1-77003dec3f37 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-e856ec42dde546ade4c501c1ec69aa6396619b700e288709f363e3a1-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c189c3a-1d67-4825-982b-3095c103e76c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-sast-shell-check-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f59e4ee2-0ea1-4926-9d1a-b8a227bb6664 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc39d875ce306299592829827b29245948-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e05c16ab-3509-4bcc-813a-3c14c04ef84b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-apply-tags-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c6df069a-4680-4788-8a60-4eb69f89c7b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigcq-on-push-bqx6j-push-dockerfile-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=930b2f27-a0e5-4c05-a133-d9ca91e7cc80 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:09:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-bfigc2c969bb2c43a9a5f0477ee84fa5fe681-pod namespace=build-e2e-zxxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=73a2ef6b-cbf8-4261-9aa3-0ba5083a8446 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:12:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-pmyh namespace=build-e2e-pmyh operation=CREATE policy=deny-virtual-domain resource=build-e2e-pmyh/Namespace/build-e2e-pmyh resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=7ecf0d8f-f340-4a05-af7d-31d749a9cd99 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=976516f91dd9a4c88be3e09a3901569c59d17d86ae3e263d0a433ef55835586e"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-16T15:13:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-default-odfbzz-on-pull-request-4pd88-init-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c0413812-b3a9-4167-a2d9-c89d52de53e2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:14:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-pull-request-79plf-init-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=99065596-2441-4afd-8371-2db698c3bf6f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:14:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cd37744a9b583520ad5478c110b4540dc2f91099ec49853f378-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4845d8a0-7568-4806-a191-d0ecca2c02ac user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:14:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-d37744a9b58375327b4061ab45a0cd3ea94b1f0d907e-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d1260a55-460f-436f-bbf5-88a69dcb6b9a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custod37744a9b5835286b88c634a7abc81c913c0852560fee7-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a95c79eb-0bf3-4a33-9f5e-c98018690aa1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-d37744a9b583520ad5b4a974b7f114f0bf3384cd22da0d3b612c3448-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=774ea27b-2c11-4160-9af5-abf8ee0cb8ca user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmac5ad825a593d709f5f4a7f9cd8f2d7a-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c45076a5-1f36-48f5-9955-ec39f524c087 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdma86cb56a7e81e39dd793b6c3f728e500-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c9de79ae-a798-4cce-8d46-87d56dbc5dd0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-d37744a9b58301e6efb42efbc8c6afd08a30702542a1-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=07e206c6-4eaa-4795-8596-1fd4b42b563e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm809f912d82b36a82a0e276f1b0164172-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=57fe0d71-f6f0-4bd9-a0cb-77a75107d1eb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-d37744a9b583520ad5b4a97470e73ded2d10a79e9cbf30d478da4ac0-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2050cc91-160a-47e5-83f1-fc17fbd47f3b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-customd37744a9b5835fd47a7bd6c28a4433668baab503c3792-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2368fc7b-5765-4fe3-af03-20977423a209 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custd37744a9b583520a85ea41f83cc503ff22b559194afded2-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a2e077b8-8e15-4d37-9480-1f4ff2bf797e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm924a0d9c391fc45ec72cdd62cb523fff-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b5ebd0ca-3c5c-47f8-b93e-d367e07f96f3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-d37744a9b58376add9ee02c538eadb0305af06c9e108-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bf744c9e-98d8-46e7-b84f-122f4986b790 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:15:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cusd37744a9b583520af1192fc3147f9c5d351e850126aab85f-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2f4e1e4-aca9-451a-9a87-df7b7fa28944 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:16:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-pull-request-zqck6-init-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6a419cd7-71ef-4007-b6f5-9a65d567eaaf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:16:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c85fb6110a22abe6f5f3b14f33bdbccd7f95861ee19ae712581-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=597fac36-acc5-4877-b4ad-41d042b26019 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:16:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-85fb6110a22aed67613ca55e78efdb62a82f506f0822-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1f766c00-7ace-4fac-9613-34509538ebf2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custo85fb6110a22abeea953e70504917a1b0b8b2092df35233-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d43b9f7a-8263-4e61-9b7f-86904d353730 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-85fb6110a22abe6f5f28ba40ddcc705504796ea5887dada67fe5dbe3-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4d0e127a-ba24-484a-8554-8ae5d289de76 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm8edac9ff449a16cb056415e51523ecf6-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=90b88bdd-e8df-4ec7-8153-a2c68382f34b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmb74fe8d4d874eb6a5493c20a5e1d9392-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=15baf42a-d5a2-47c0-88f9-521c9ab0a1e4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-85fb6110a22abb706d91c58581a26d64a96ff92137c1-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=08779de5-8345-4fea-ac9a-a25782491222 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm5fe5f41035da12cd75c24e55e015b196-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aa8444c9-9676-459f-85bc-bf94d0d0f85d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-85fb6110a22abe6f5f28ba406efb25b3f8ec3987cb54cf8b68e656af-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4a190435-c696-4040-ba3e-b217cf78ae6e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom85fb6110a22abac6ec6ee205b890397152075b3571e09-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=85141f0e-d9e5-474c-8c20-535006450f24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cust85fb6110a22abe693b99bf9c9b2ee1dd2b70c0221aa775c-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80f4a3f6-7aa4-45d0-8f51-d08bc6e9dcbc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm2b6b70784fa97c7082e76b2fa151bf73-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=15a8d639-7d3c-42d0-9828-71339b3f13c1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-85fb6110a22ae585bcb5b492519ea1ae7cbc70598fc0-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c9b0db53-e385-4497-a401-f7c85f2395d1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:17:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cus85fb6110a22abe6fa8784fe0f4808fd08be22b4a6a6da3d8-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4320018b-4950-4e55-879a-b5d49a164f1b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:18:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-pull-request-x8dkl-init-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fbacd0f7-8777-4f6b-9d2b-b9699708ceec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:18:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-c6fb8f9ddb89292cabbf7d16c07a92d515fc1b9b22ad6e272aa-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3a6f0a1a-eceb-4f5a-8f7f-46f23adcb6df user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-6fb8f9ddb892ae10d25a0683afaea70703e9cd73cd26-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ccea41dc-87dd-4927-a799-928b0427385f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custo6fb8f9ddb8929204d89916b16e5c0d9279b81199dd8be1-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a636c946-8e19-406a-b60d-3da48ea2ae69 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-6fb8f9ddb89292cabb4ce149add99da7245cb1e05e7ccb2cc3432964-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0dde8552-aa3d-415c-a13a-98d22a6a9149 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdma4dc9e62939fc2288bf4a2d2650f7427-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78508970-83e2-4d43-96ce-be51943cc8a9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm44c3a290e39be6ab74a6764f8972cb7b-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4c6b5ba-229b-44d8-b5b5-c60ed6a96d00 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-6fb8f9ddb8920000d58f69649e40a630cb4531433389-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d361241b-f2e2-4c7a-a443-83fada59c7a0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm5ebe19d5640efbdfcf1e339ef781cbb4-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6633c368-bd96-43e9-9f2f-596dfa5b0817 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-6fb8f9ddb89292cabb4ce149ee4ee608e4858374c7c722c2d32149fd-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c95c463-f39e-4218-83e9-56fd883a7a14 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom6fb8f9ddb89297c9721afd4469848ac135d6864d8d359-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9c244d80-a5aa-4d0c-a451-0f9ef06d5e1b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cust6fb8f9ddb89292cb5808c8a7549c2e63b30d15733267ce7-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a064008-83d7-410c-adba-658e0fc13772 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm2ff651a26f495041b5d906e02bd5a8c4-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5a7850ed-f698-455e-9607-be6ca5298297 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-6fb8f9ddb89208c8510620f7309630371df10277968b-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a5deaefb-d1ec-4ee1-8f2f-16b4348d79f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:19:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cus6fb8f9ddb89292ca904f4a1186957bf374fd8b222e232f9c-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8b41379a-996c-4586-af59-52c2babaed9b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:20:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-init-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5f02e34d-105d-402e-969c-60b7b39b94df user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:20:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-cd5aa73f9c38f134496e95a7fbd25792b7574439aaf778817a1-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=87e22621-56e8-418b-8793-62c9b5911521 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:21:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-build-container-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6d330682-0c9c-4528-bc65-cd18eb489e37 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:21:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm571145d2758e73e47f87a0392597693d-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1c9b0e1e-7ce8-4f62-ba14-2d3b19995c1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-d5aa73f9c38f13449617a450d04e26d27b30d8f02ee7685573f6a47e-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=17c33093-079b-4326-844c-61e6879a0152 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-clair-scan-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=880c23f3-0b72-47cc-88fe-58d7f73fbeb4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm3dd8cbd9da163015f1fba60425ec2098-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=235795cc-8586-4179-a10b-53ac30026714 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-sast-snyk-check-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dde5db00-e29b-47be-8885-44c04f86ffec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-clamav-scan-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=41e23e15-c11d-44c6-96c5-42fef510e797 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-d5aa73f9c38f13449617a450b2e3fe28802239c5f9eee69d54ffd626-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2f4270c9-8b7c-4058-89c8-d878603f8609 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-sast-shell-check-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d57c7e86-9407-49f9-bd62-6053fbf5a2bb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm1048ab1a60b66720a3390bb194fd195a-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c131a4e0-c27b-45f3-bbbf-983bf73da5c0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-apply-tags-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a18cf80e-6c68-4a24-9621-b6a034708b1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdmd-on-push-6krr2-push-dockerfile-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee4597fb-2bae-44a2-95ac-a620d9b6db39 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-16T15:22:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gl-test-custom-branch-qxtdm3ea6f9599f438165b88721ae45bf1b58-pod namespace=build-e2e-pmyh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ca5d628f-ae88-4d54-a0b7-875954c0b0f8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1be8ff50-c323-40f6-8a5d-78816c648de8"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["76ffbffa-a12c-4f43-9174-22fe7eba3048"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-dgg4j"],"authentication.kubernetes.io/pod-uid":["ff84621b-2ed8-46e9-ae71-eda10c3d34c6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"bbf329fe-e5a3-4bf0-8c90-b1b34341601e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2