running buildah-tssc Step: buildah-tssc Results: /workspace/source/source/results/buildah-tssc Custom root CA variable is not set. Make sure CA trust is established ========Running buildah-tssc:login --- Registry Auth Bypass Active --- ========Running buildah-tssc:build [1/2] STEP 1/4: FROM registry.access.redhat.com/ubi8/dotnet-60:6.0-56 AS builder Trying to pull registry.access.redhat.com/ubi8/dotnet-60:6.0-56... Getting image source signatures Checking if image destination supports signatures Copying blob sha256:c9ea21ed8be2224d8905e2b61fcfa7b7c3b28de2e57b2a57e1ed64106a67ab99 Copying blob sha256:de1a4526c3d6cdf0e04f24b1888f5ef31425209f1c26e5a6ae7694cdad6e8688 Copying blob sha256:68e455cb0aea90f85be197ceadef7a56ca5a4d7bf6761a3a58b0ab36a65f770e Copying config sha256:a33af805134171f684198c9cc51cafc4e503192a39ee8cf8ef8c31fcf5fbcf87 Writing manifest to image destination Storing signatures [1/2] STEP 2/4: WORKDIR /opt/app-root/src [1/2] STEP 3/4: COPY --chown=1001 . . [1/2] STEP 4/4: RUN dotnet publish -c Release Microsoft (R) Build Engine version 17.0.4+85d71072f for .NET Copyright (C) Microsoft Corporation. All rights reserved. Determining projects to restore... Restored /opt/app-root/src/app.csproj (in 100 ms). app -> /opt/app-root/src/bin/Release/net6.0/app.dll app -> /opt/app-root/src/bin/Release/net6.0/publish/ [2/2] STEP 1/6: FROM registry.access.redhat.com/ubi8/dotnet-60:6.0-56 [2/2] STEP 2/6: EXPOSE 8081 [2/2] STEP 3/6: ENV ASPNETCORE_URLS=http://*:8081 [2/2] STEP 4/6: COPY --from=builder /opt/app-root/src/bin /opt/app-root/src/bin [2/2] STEP 5/6: WORKDIR /opt/app-root/src/bin/Release/net6.0/publish [2/2] STEP 6/6: CMD ["dotnet", "app.dll"] [2/2] COMMIT quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5 Getting image source signatures Copying blob sha256:c3241ebf95fe8d71a9611ea38e6f1376991262974696394cea2ec54cab5556e1 Copying blob sha256:b7a3bb88924da0935465027f0cd897ea863cd28cf80fd3cba9734aad7c9de266 Copying blob sha256:b8e74ef5cc4badbe598c5faf43e1215e4f10ef1e1ec302d032910e755a0789f7 Copying blob sha256:d87505e720109de587677a23a9404524c0df3494518cb1981a6e57e5e9a84323 Copying config sha256:c5f5b38d2a44f9e38459d5ab8455805ba438483dc580d0693213eda566469c16 Writing manifest to image destination --> c5f5b38d2a44 Successfully tagged quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5 c5f5b38d2a44f9e38459d5ab8455805ba438483dc580d0693213eda566469c16 Getting image source signatures Copying blob sha256:d87505e720109de587677a23a9404524c0df3494518cb1981a6e57e5e9a84323 Copying blob sha256:c3241ebf95fe8d71a9611ea38e6f1376991262974696394cea2ec54cab5556e1 Copying blob sha256:b7a3bb88924da0935465027f0cd897ea863cd28cf80fd3cba9734aad7c9de266 Copying blob sha256:b8e74ef5cc4badbe598c5faf43e1215e4f10ef1e1ec302d032910e755a0789f7 Copying config sha256:c5f5b38d2a44f9e38459d5ab8455805ba438483dc580d0693213eda566469c16 Writing manifest to image destination sha256:af31ad1a610f10efcd7185c9f67d743075eee08b1e4c8d3e6a64281b831f1741quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5Getting image source signatures Copying blob sha256:d87505e720109de587677a23a9404524c0df3494518cb1981a6e57e5e9a84323 Copying blob sha256:b7a3bb88924da0935465027f0cd897ea863cd28cf80fd3cba9734aad7c9de266 Copying blob sha256:b8e74ef5cc4badbe598c5faf43e1215e4f10ef1e1ec302d032910e755a0789f7 Copying blob sha256:c3241ebf95fe8d71a9611ea38e6f1376991262974696394cea2ec54cab5556e1 Copying config sha256:c5f5b38d2a44f9e38459d5ab8455805ba438483dc580d0693213eda566469c16 Writing manifest to image destination ========Running buildah-tssc:generate-sboms { "bom-ref": "af63bd4c8601b7f1", "type": "file", "name": "e2e-tests-dotnet-basic-bokdwefa", "version": "f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5" } { "bom-ref": "d394370e26116720", "type": "container", "name": "quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5", "version": "sha256:af31ad1a610f10efcd7185c9f67d743075eee08b1e4c8d3e6a64281b831f1741" } ========RUNNING PYTHON ========Running buildah-tssc:upload-sbom There is a discussion in sigstore community triggered by https://github.com/sigstore/cosign/issues/3599. It is likely that cosign attach deprecation will be reverted. Please, ignore deprecation warning for now. WARNING: SBOM attachments are deprecated and support will be removed in a Cosign release soon after 2024-02-22 (see https://github.com/sigstore/cosign/issues/2755). Instead, please use SBOM attestations. WARNING: Attaching SBOMs this way does not sign them. To sign them, use 'cosign attest --predicate /workspace/source/source/results/temp/files/sbom-cyclonedx.json --key '. Uploading SBOM file for [quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:f0cfcaea6027ee2bb133773b3ce6180a97fcd8b5] to [quay.io/rhtap_qe/e2e-tests-dotnet-basic-bokdwefa:sha256-af31ad1a610f10efcd7185c9f67d743075eee08b1e4c8d3e6a64281b831f1741.sbom] with mediaType [application/vnd.cyclonedx+json]. ========