pod: test-comp-pac-gitlab-sygyvo-on-pull-request-cbd5j-init-pod | init container: prepare 2025/10/23 11:59:03 Entrypoint initialization pod: test-comp-pac-gitlab-sygyvo-on-pull-request-cbd5j-init-pod | init container: place-scripts 2025/10/23 11:59:11 Decoded script /tekton/scripts/script-0-9hp46 pod: test-comp-pac-gitlab-sygyvo-on-pull-request-cbd5j-init-pod | container step-init: Build Initialize: quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 Determine if Image Already Exists pod: test-comp-pac-gitlab-sygyvo157de8cf02ce1d79a7ed03bbfd2fe34f-pod | init container: prepare 2025/10/23 12:01:35 Entrypoint initialization pod: test-comp-pac-gitlab-sygyvo157de8cf02ce1d79a7ed03bbfd2fe34f-pod | init container: place-scripts 2025/10/23 12:01:42 Decoded script /tekton/scripts/script-0-7f9cx 2025/10/23 12:01:42 Decoded script /tekton/scripts/script-1-lsnxm pod: test-comp-pac-gitlab-sygyvo157de8cf02ce1d79a7ed03bbfd2fe34f-pod | container step-extract-and-scan-image: Starting clamd ... clamd is ready! Extracting image(s). Running "oc image extract" on image of arch amd64 Scanning image for arch amd64. This operation may take a while. ----------- SCAN SUMMARY ----------- Infected files: 0 Time: 15.939 sec (0 m 15 s) Start Date: 2025:10:23 12:02:43 End Date: 2025:10:23 12:02:59 Executed-on: Scan was executed on clamsdcan version - ClamAV 1.4.3/27800/Wed Oct 22 09:44:05 2025 Database version: 27800 [ { "filename": "/work/logs/clamscan-result-log-amd64.json", "namespace": "required_checks", "successes": 2 } ] {"timestamp":"1761220979","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1761220979","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"timestamp":"1761220979","namespace":"required_checks","successes":2,"failures":0,"warnings":0,"result":"SUCCESS","note":"All checks passed successfully"} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744", "digests": ["sha256:b29f417c424dd847eddb4db5fe27be26d736df83a6aa21e1c5de30348701c719"]}} pod: test-comp-pac-gitlab-sygyvo157de8cf02ce1d79a7ed03bbfd2fe34f-pod | container step-upload: Selecting auth Using token for quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo Attaching to quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 Executing: oras attach --no-tty --registry-config /home/oras/auth.json --artifact-type application/vnd.clamav quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744@sha256:b29f417c424dd847eddb4db5fe27be26d736df83a6aa21e1c5de30348701c719 clamscan-result-amd64.log:text/vnd.clamav clamscan-ec-test-amd64.json:application/vnd.konflux.test_output+json Preparing clamscan-result-amd64.log Preparing clamscan-ec-test-amd64.json Uploading 1897a2b9a488 clamscan-result-amd64.log Exists 44136fa355b3 application/vnd.oci.empty.v1+json Uploading adfcf3367a33 clamscan-ec-test-amd64.json Uploaded 1897a2b9a488 clamscan-result-amd64.log Uploaded adfcf3367a33 clamscan-ec-test-amd64.json Uploading 01f0b3703a22 application/vnd.oci.image.manifest.v1+json Uploaded 01f0b3703a22 application/vnd.oci.image.manifest.v1+json Attached to [registry] quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744@sha256:b29f417c424dd847eddb4db5fe27be26d736df83a6aa21e1c5de30348701c719 Digest: sha256:01f0b3703a22d02503f2c961ffcb9a36060169686ae9dbfa9055038089d3d585 pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | init container: prepare 2025/10/23 12:01:34 Entrypoint initialization pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | init container: place-scripts 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-0-ccx8b 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-1-wxjxh 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-2-bwzmt 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-3-jwxs9 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-4-jczmt 2025/10/23 12:01:36 Decoded script /tekton/scripts/script-5-nldn5 pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-introspect: Artifact type will be determined by introspection. Checking the media type of the OCI artifact... Executing: skopeo inspect --raw --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 The media type of the OCI artifact is application/vnd.docker.distribution.manifest.v2+json. Looking for image labels that indicate this might be an operator bundle... Executing: skopeo inspect --retry-times 3 docker://quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 Found 0 matching labels. Expecting 3 or more to identify this image as an operator bundle. Introspection concludes that this artifact is of type "application". pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-generate-container-auth: Selecting auth for quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 Using token for quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo Auth json written to "/auth/auth.json". pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-set-skip-for-bundles: 2025/10/23 12:02:24 INFO Step was skipped due to when expressions were evaluated to false. pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-app-check: time="2025-10-23T12:02:24Z" level=info msg="certification library version" version="1.14.1 " time="2025-10-23T12:02:25Z" level=info msg="running checks for quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 for platform amd64" time="2025-10-23T12:02:25Z" level=info msg="target image" image="quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744" time="2025-10-23T12:02:37Z" level=info msg="check completed" check=HasLicense result=FAILED time="2025-10-23T12:02:37Z" level=info msg="check completed" check=HasUniqueTag result=PASSED time="2025-10-23T12:02:37Z" level=info msg="check completed" check=LayerCountAcceptable result=PASSED time="2025-10-23T12:02:37Z" level=info msg="check completed" check=HasNoProhibitedPackages result=PASSED time="2025-10-23T12:02:37Z" level=info msg="check completed" check=HasRequiredLabel result=PASSED time="2025-10-23T12:02:37Z" level=info msg="USER 185 specified that is non-root" check=RunAsNonRoot time="2025-10-23T12:02:37Z" level=info msg="check completed" check=RunAsNonRoot result=PASSED time="2025-10-23T12:02:45Z" level=info msg="check completed" check=HasModifiedFiles result=PASSED time="2025-10-23T12:02:47Z" level=info msg="check completed" check=BasedOnUbi result=PASSED time="2025-10-23T12:02:47Z" level=info msg="This image's tag on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744 will be paired with digest sha256:b29f417c424dd847eddb4db5fe27be26d736df83a6aa21e1c5de30348701c719 once this image has been published in accordance with Red Hat Certification policy. You may then add or remove any supplemental tags through your Red Hat Connect portal as you see fit." { time="2025-10-23T12:02:47Z" level=info msg="Preflight result: FAILED" "image": "quay.io/redhat-appstudio-qe/gitlab-rep-liha/test-comp-pac-gitlab-sygyvo:on-pr-bbb7d34df4c9303cf7a5c574b762e4de9a5b3744", "passed": false, "test_library": { "name": "github.com/redhat-openshift-ecosystem/openshift-preflight", "version": "1.14.1", "commit": "436b6cd740f4144eba59ad1378be00383c7b0269" }, "results": { "passed": [ { "name": "HasUniqueTag", "elapsed_time": 0, "description": "Checking if container has a tag other than 'latest', so that the image can be uniquely identified." }, { "name": "LayerCountAcceptable", "elapsed_time": 0, "description": "Checking if container has less than 40 layers. Too many layers within the container images can degrade container performance." }, { "name": "HasNoProhibitedPackages", "elapsed_time": 45, "description": "Checks to ensure that the image in use does not include prohibited packages, such as Red Hat Enterprise Linux (RHEL) kernel packages." }, { "name": "HasRequiredLabel", "elapsed_time": 0, "description": "Checking if the required labels (name, vendor, version, release, summary, description, maintainer) are present in the container metadata" }, { "name": "RunAsNonRoot", "elapsed_time": 0, "description": "Checking if container runs as the root user because a container that does not specify a non-root user will fail the automatic certification, and will be subject to a manual review before the container can be approved for publication" }, { "name": "HasModifiedFiles", "elapsed_time": 8638, "description": "Checks that no files installed via RPM in the base Red Hat layer have been modified" }, { "name": "BasedOnUbi", "elapsed_time": 1230, "description": "Checking if the container's base image is based upon the Red Hat Universal Base Image (UBI)" } ], "failed": [ { "name": "HasLicense", "elapsed_time": 0, "description": "Checking if terms and conditions applicable to the software including open source licensing information are present. The license must be at /licenses", "help": "Check HasLicense encountered an error. Please review the preflight.log file for more information.", "suggestion": "Create a directory named /licenses and include all relevant licensing and/or terms and conditions as text file(s) in that directory.", "knowledgebase_url": "https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction", "check_url": "https://access.redhat.com/documentation/en-us/red_hat_software_certification/2024/html-single/red_hat_openshift_software_certification_policy_guide/index#assembly-requirements-for-container-images_openshift-sw-cert-policy-introduction" } ], "errors": [] } } pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-app-set-outcome: {"result":"FAILURE","timestamp":"1761220967","note":"Task preflight is a FAILURE: Refer to Tekton task logs for more information","successes":7,"failures":1,"warnings":0} pod: test-comp-pac-gitlab-sygyvod9999905264a4ea787d9d816bd330f00-pod | container step-final-outcome: + [[ ! -f /mount/konflux.results.json ]] + tee /tekton/steps/step-final-outcome/results/test-output {"result":"FAILURE","timestamp":"1761220967","note":"Task preflight is a FAILURE: Refer to Tekton task logs for more information","successes":7,"failures":1,"warnings":0} pod: test-comp-pac-gitlab-sygyvof3fdaaa4f7145a84b875744e9792e30e-pod | init container: prepare 2025/10/23 12:01:55 Entrypoint initialization pod: test-comp-pac-gitlab-sygyvof3fdaaa4f7145a84b875744e9792e30e-pod | init container: place-scripts 2025/10/23 12:01:58 Decoded script /tekton/scripts/script-0-cb94h 2025/10/23 12:01:58 Decoded script /tekton/scripts/script-1-lq8mn pod: test-comp-pac-gitlab-sygyvof3fdaaa4f7145a84b875744e9792e30e-pod | container step-apply-additional-tags-from-parameter: No additional tags parameter specified pod: test-comp-pac-gitlab-sygyvof3fdaaa4f7145a84b875744e9792e30e-pod | container step-apply-additional-tags-from-image-label: No additional tags specified in the image labels